单选

Passage One

Social anxiety is the single most common psychological problem, according to the 1986 results of the Stanford shyness inventory, a survey conducted by Philip G.Zimbardo, a professor of social psychology at Stanford University in California. At a party with strangers, for instance, three-quarters of adults feel anxious. “The best estimate is that 40 percent of all Americans suffer from shyness,” says Zimbardo.

How can you avoid being nervous when you meet people? Prepare. Preparation for any communication situation is a must. You’ve been invited to a big dinner party in two weeks. You know that one of the other guests is a politician. Scan the newspapers and magazines; listen to newscasts for topics of conversation in political areas. Then at the party, pretend you’re an interviewer on talk show. Think of questions to ask what can’t be answered yes or no. “In your opinion, who...”“What do you think of...” Keep the momentum going.

Whether you’re delivering a speech, approaching your boss for a raise or an important social occasion, do your homework. The most polished, smoothly delivered, spontaneous-sounding talks are the result of many hours of work. The memorable one-liners and moving phrases that go down in history don’t come from last-minute bursts of inspiration.

If you’re making a presentation of any sort, begin preparing as far ahead of time as possible. “Good writing,” says Harvard University historian Richard Marius, “is a kind of wrestling with thought.” Begin the wrestling match early. Two days before your presentation is usually too late to go into the ring and come up with a winning idea.

“To communicate,” says New York Times columnist William Safire, “put your thoughts in order, give them a purpose; use them to persuade, to instruct, to discover, to seduce.”

Prepare yourself as well as your material, giving special attention to your voice. A shrill, nasal tone strikes your listeners like chalk screeching on a blackboard. By putting energy and resonance into your voice, you will have a positive effect. If your voice is timid or quivers with nervousness, you sense it, the audience hears it, and you see discomfort in their eyes. With energy and enthusiasm in your voice the listeners say ahhh, tell me more. You read approval.

Like your voice, your appearance is a communication tool. For example, if you are animated, you are most likely to see animated listeners. You give the audience the message: I’m glad I’m here; I’m glad you’re here.

Your approach can, in fact, be a powerful weapon for deflecting hostility-from an audience, an interviewer, an employer. A benevolent aspect says I understand and conveys good will and positive expectations. It works.

Questions l-5 are based on Passage One.

  • According to paragraph 2, one can avoid shyness while talking to a politician at a party by ______.
  • A.listening to his talk
  • B.reading newspapers to him
  • C.preparing in a advance
  • D.asking him hard questions
参考答案
您可能感兴趣的试题

Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. (46. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment.) A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyse a company’s operations. Anyone familiar with the procedure can gain access to information stored in the computer, no matter how confidential, and use it for his own purposes.

Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. (47. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft.) Once the computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.

(48. Computer criminals are, for the most part, well-educated and highly intelligent, and have the analytical skills that make them valued employees.) The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantage is constantly being extended. (49. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances.) Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, of course, the company’s total payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.Sabotage is also an increasingly common type of computer crime. This can involve disabling the hardware, but is more likely to affect the software. Everyone in the computer business has heard of cases of a “time-bomb” being placed in a program. (50. Typically, the programmer inserts an instruction that causes the computer to destroy an entire personnel data bank, for example, if the programmer’s employment is terminated.) As soon as the termination data is fed into the system, it automatically erases the entire program.

¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服