雅思閱讀如何搞定判斷題
雅思閱讀判斷題對(duì)于很多同學(xué)來說可謂又愛又恨,小編今天給大家?guī)砹巳握?,一起來學(xué)習(xí)吧,下面小編就和大家分享,來欣賞一下吧。
雅思閱讀--三段論搞定判斷題
今天我們在這里所說的三段落不是雅思寫作里的三段論,而是邏輯學(xué)里的三段論,是演繹推理中的一種簡單推理判斷。它包含:一個(gè)一般性的原則(大前提),一個(gè)附屬于前面大前提的特殊化陳述(小前提),以及由此引申出的特殊化陳述符合一般性原則的結(jié)論。
舉個(gè)例子解釋一下:
重慶人喜歡吃火鍋(大前提),小張是重慶人(小前提),所以小張喜歡吃火鍋(結(jié)論)。
當(dāng)然三段論會(huì)有幾種不同的呈現(xiàn)形式,剛才的例子只是其中一種肯定形式的推斷,三段論里也含有否定推導(dǎo),再舉一個(gè)例子:
海洋哺乳動(dòng)物不是魚類(大前提),鯨是海洋哺乳動(dòng)物(小前提),所以鯨不是魚類(結(jié)論)。
這兩個(gè)例子主要差異在于表達(dá)的肯定和否定上,還有一種推導(dǎo)的例子:小張不被允許去酒吧(前提一),十八歲以上的才被允許去酒吧(前提二),所以小張未滿十八歲(結(jié)論)。
了解了三段論的基本形式后,我們要看看它對(duì)于我們解判斷題有什么意義。我們都知道判斷題里TRUE常見有兩種呈現(xiàn)形式,一種是考點(diǎn)進(jìn)行同義替換,一種是靠歸納總結(jié)出來。
既然需要?dú)w納總結(jié),說明在文中并沒有一個(gè)句子直接告訴我們答案,而是多個(gè)句子的結(jié)合,這種歸納就要運(yùn)用我們這里探討的三段論了。下面我們來看幾個(gè)比較經(jīng)典的例子,看看三段論的運(yùn)用。
雅思劍五第四套33題:Eastern hemlock is a fast-growing plant. 我們用eastern hemlock和fast-growing plant進(jìn)行定位,發(fā)現(xiàn)了兩個(gè)句子,一個(gè)位于最后一段的第三句:Shade-tolerant plants have lower photosynthetic rates and hence have lower growth rates than those of shade-intolerant species. (喜陰的植物比起喜陽的植物有著更低的光合作用率,因此有著更低的生長速度。)另一個(gè)則位于該段的倒數(shù)第二句:For example, eastern hemlock seedlings are shade-tolerant. (比如,東方毒芹的幼苗是喜陰的。)
這就是典型的大前提(喜陰植物生長速度慢)的小前提(東方毒芹是喜陰植物),因此我們就可以推出結(jié)論——東方毒芹生長速度慢。這與題目是相違背的,因此這道題應(yīng)當(dāng)判斷為FALSE。我們再來看一個(gè)運(yùn)用三段論進(jìn)行推斷的例子▼劍八第一套第24題:Class F airspace is airspace which is below 365m and not near airports. (F類別空間是在365米以下,而且不在機(jī)場附近。)我們用Class F和365米進(jìn)行定位,分別在E段和G段讀到這樣的幾個(gè)句子:In general, from 365m above the ground and higher, the entire country is blanketed by controlled airspace. In certain areas, mainly near airports, controlled airspace extends down to 215m above the ground, and, in the immediate vicinity of an airport, all the way down to the surface. (整體而已,從地面往上的365米以上或者更高,整個(gè)國家都是由受管控空間所覆蓋。在特定地區(qū),主要在機(jī)場附近,受管控區(qū)域延生到地面往上215米以上,而且在機(jī)場周邊的話,一直延生到地面)。
G段里有這樣的一個(gè)句子:Uncontrolled airspace is designated Class F, while controlled airspace below 5, 490m above sea level and not in the vicinity of an airport is Class E. (不受管控的空間被標(biāo)為Class F……).
大家把這幾句話連起來讀,就會(huì)發(fā)現(xiàn)它們之間有一個(gè)銜接點(diǎn):uncontrolled airspace和controlled airspace,兩者正好是對(duì)立的,既然受管控的空間屬于365米以上,機(jī)場附近是從215米往上,機(jī)場就從地面算起都是,那么不受管控的空間不就是365米往下,機(jī)場附近都不是,這樣就是我們的24題所表達(dá)的意思了。
我們把這個(gè)邏輯稍微精簡一下:甲管A范圍(前提一),不屬于甲的都是乙(前提二),所以乙管A范圍外的(結(jié)論)。
三段論其實(shí)在我們的生活中是非常常見的,在雅思閱讀的邏輯推論中運(yùn)用雖然不多,但是并不是難點(diǎn),不過要想運(yùn)用熟練需要大家熟悉這個(gè)理論,相信大家多做練習(xí)必定能熟練掌握其運(yùn)用。
雅思閱讀高分秘籍--詞匯+paraphrase
雅思閱讀錦囊一:英語詞庫
所謂英語詞庫是英語對(duì)英語的詞庫而非是英語對(duì)漢語的詞庫。每個(gè)烤鴨都清楚雅思是國際性考試而非中國性質(zhì)考試,單詞背其中文意思在考試過程中是無效的,題目和文章都沒有中文的出現(xiàn)。雅思閱讀就是在全文中的找答案,可是你所用定位的詞很多時(shí)候不會(huì)老老實(shí)實(shí)的坐在原文里等著你,這就需要你具備英語同義詞的能力,比如劍橋6的67頁的list of headings 的 key point 2 的首句中managers should ensure that all employees have specific goals and receive comments on how well they are doing in those goals. 與之相對(duì)應(yīng)的答案是establish targets and give feedback 同意詞組為:have specific goals等于establish targets,receive comments on how well they are doing in those goals等于give feedback。
雅思閱讀錦囊二:ability to paraphrase
Paraphrase意思是用英文的句子或者段落來解釋其英文的句子或者段落。對(duì)于外語系的孩子來講這種能力的考試是家常便飯,也就造就了他們的理解能力比非外語系的同學(xué)們好很多。這種能力在雅思閱讀考試中也是司空見慣的。例如:劍橋6的43頁的判斷題10. Cities with high level of bicycles usage can be efficient even when public transport is only averagely good. 很多孩子看見only習(xí)慣性判為NO。因?yàn)樘^對(duì)了。實(shí)則不然,答案為YES。對(duì)應(yīng)于原文中two most ‘bicycle friend’ cities considered—Amsterdam and Copenhagen—were very efficient, even though their public transport systems were ‘ reasonable but special.
切記:高分的取得不只是靠技巧,雅思閱讀能力的提升非常的重要。
雅思閱讀全真練習(xí)系列:Hackers target the home front
Hackers target the home front
1. One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.
2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.
Growing threat
3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.
4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.
5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to ___s, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.
6. Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds.
7. Has this actually happened? In some cases sources claim that the login details of ___s have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.
8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank."
9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.
10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.
11. "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors."
Increased vigilance
12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.
13. "This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office."
(667 words)
Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.
1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?
2. Which word is most likely to be used by hackers to describe home computers?
3. What do the majority of people in the UK prefer?
4. How do hackers collect information so as to compose emails?
5. What do hackers obtain illegally to gain access to banks’ computer network?
Questions 5-12 Complete the sentences below with words from the passage.
Use NO MORE THAN THREE WORDS for each answer.
6. The use of login details of ___s by criminals does not necessarily result in any ______________.
7. Royal Bank of Scotland claimed that they are not the only victim of ______________.
8. Corporate networks will be another target of hackers with improved _______________.
9. The attacks on individuals have been greatly increased within _______________.
10. With ________________, software used by criminals can eliminate its competing programs.
11. Home users are chosen as a target because they are considered as a __________ .
12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.