ImageVerifierCode 换一换
格式:DOC , 页数:42 ,大小:195KB ,
资源ID:1450384      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1450384.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(大学六级-1607及答案解析.doc)为本站会员(fuellot230)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

大学六级-1607及答案解析.doc

1、大学六级-1607 及答案解析(总分:667.00,做题时间:90 分钟)一、Part Writing(总题数:1,分数:106.00)1.简述社会上大学生忙于报考各种证书的现象2陈述这种现象产生的原因3阐述考证热的影响,并简述我的观点Useful words and expressions:证书:certificate狂热者:maniacCertificate Mania(分数:106.00)_二、Part Reading Compr(总题数:4,分数:70.00)Computer VirusesAny computer connected to the Internet faces a d

2、aunting range of electronic threats. Perhaps the biggest single threat to any computer is the humble software bug. Seemingly harmless programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to spread.Many software bugs

3、will simply cause a computer to crash. But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data.When a software weakness is revealed, it is often a race against the clock t

4、o apply the correct software patch before an attacker can convert the bug into an “exploit“ that can be used to cause major damage. Viruses and WormsA computer virus is a program that spreads between computers by hiding itself within a seemingly innocent-document or application. A worm, on the other

5、 hand, is a program that replicates (复制) and travels without “infecting“ anything else on a system.Many modern specimens of malevolent (恶意的) code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. The terms are now often used inte

6、rchangeably.The first worms appeared in the 1970s and spread slowly between computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy di

7、sks.Trojans and ZombiesBut viruses and worms no longer just provide a way for ill willed hackers to gain bad reputation. Todays viral code can contaminate computers at lightning speed, spreading via e-mail, peer-to-peer file-sharing networks and even instant messaging programs. The most successful o

8、nes cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up.A string of recent specimens have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines. These program

9、s are known as Trojan horses.There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers-often referred to as “botnets“. These groups of remote controlled “zombies“ have been used to extort money from websites, by threatening to crash t

10、hem with a denial-of-service (Dos) attack. This involves overloading a server with bogus page requests, so that real messages cannot get through. Spam, Spam, SpamSpammers have also begun using botnets to forward unwanted bulk e-mail advertising, or spare, through scores of zombie PCs. This makes it

11、far more difficult for spam hunters to block the messages at source and catch the criminals.Once considered a fairly minor problem, spam is rapidly spiraling out of control, and much more than half of all e-mail messages are now thought to consist of unwanted advertising messages.To combat computer

12、scientists best efforts to stem the tide of junk e-mail, the spammers have had to become more cunning and sophisticated. More recently, spim (spam by instant messenger) and spit (spam by Internet telephony) have joined the fray. PhishingSpams more sinister cousin is the phishing e-mail. This is a co

13、n trick that arrives as an e-mail and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.The simplest phishing tricks try to cheat a target into sending money as part of a get-rich-quick scheme. But phishing

14、 tricksters are also getting more devious and recent scams pose as customer service e-mails and send users to false banking or commercial websites where they are invited to “re-enter“ their account information.Some genuine sites have even proven vulnerable to software glitches that can be exploited

15、to capture information from regular users. Phishing is especially threatening because it can be used to steal a persons digital identity.SpywareAlong with spam and phishing, spyware represents the third of an unhappy trinity of Internet pests. These threatening and secret programs typically find the

16、ir way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts, change system settings and gather information on a users online behavior for marketing purposes.

17、HackersThe term “computer hacker“ was first coined in the 1960s and originally meant someone capable of developing an ingenious solution to a programming problem. But the phrase has since fallen into disrepute, entering the popular vocabulary as a term for a programmer with criminal intent.The earli

18、est “criminal“ hackers were in fact relatively harmless, interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed innocuous pranks, for example employing low-tech tricks to get free calls through the US phone networks.There are

19、many tools in the modem hacking kit, including network scanners, packet sniffers, root kits and decompilers. But “social engineering“-for example, putting a particularly enticing message in an e-mail header to encourage people to open it-and even search engines can also be useful weapons for the hac

20、ker. Computer CrimeAs the number of computers networks has grown, so have the possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals.Criminal gangs have also started to get in on the action, attrac

21、ted by the huge quantities of money now spent online every day. There is evidence that unscrupulous experts can also earn serious money from crime business group by breaking into computer systems, writing viruses and creating phishing scams.And it is not just ordinary desktop computers that are unde

22、r threat. Governments, banks and critical infrastructure can also be brought to a standstill by an expert armed only with a laptop computer and a net connection. Mobile MenaceThe biggest new target for computer hackers is the mobile device. Virus writers are already experimenting with code designed

23、for smart phones and experts predict more may be on the way, while hackers are also looking at ways to crack handheld devices.While the Interact has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked

24、with preventing them has only just begun.(分数:49.00)(1).What is the biggest single threat to any computer?A. Computer viruses. B. Trojans. C. Software bug. D. Spam.(分数:7.00)A.B.C.D.(2).A computer virus, in a narrow sense, is _.A. an innocent program stored in the computerB. a program that spreads bet

25、ween computers by hiding itself within a document or applicationC. a program that replicates and travels without “infecting“ anything else on a systemD. both B and C(分数:7.00)A.B.C.D.(3).Which of the following is NOT true according to the text?A. The first worms appeared in 1970, much earlier than th

26、e first computer virus.B. The first worms simply displayed an annoying message on the screen of each infected machine.C. The first computer virus was written in 1982 and infected computers via floppy disks.D. The first worms spread slowly between computers connected to the same network.(分数:7.00)A.B.

27、C.D.(4).Which of the following situations is NOT probable for todays viral code to contaminate computers?A. When you receive an e-mail from your friend.B. When you use a flash disk to copy the documents from your colleagues computers.C. When you chat with your pals on MSN or QQ.D. When you write a c

28、omputer program for a software company.(分数:7.00)A.B.C.D.(5).Which of the following is true about “the unhappy trinity of Internet pests“?A. They are spam, phishing and Trojans.B. Spare is a fairly minor problem today.C. Phishing can be used to steal a persons digital identity.D. Most spywares can ex

29、ploit software bugs to get onto a machine.(分数:7.00)A.B.C.D.(6).Which of the following is NOT true about hackers?A. “Computer hacker“ was once a neutral term.B. The earliest criminal hackers steal peoples IDs and credit passwords.C. “Hacker“ is now a term for a programmer with criminal intent.D. Some

30、 early hackers would employ low-tech tricks to get free calls through the US phone networks.(分数:7.00)A.B.C.D.(7).What is the main purpose of this article?A. To introduce different kinds of computer viruses and their harms.B. To teach people how to guard against computer viruses.C. To briefly introdu

31、ce the history of computer hackers and viruses.D. To compare the degrees of harms from various computer viruses.(分数:7.00)A.B.C.D.2.When a software weakness is revealed, it is often _ to apply the correct software patch before an attacker can convert the bug into an “exploit“ that can be used to caus

32、e major damage.(分数:7.00)填空项 1:_3.A string of recent Trojan horses have been designed to _ and install programs that can be used to remotely control infected machines.(分数:7.00)填空项 1:_4.There is evidence that unscrupulous experts can also earn serious money from crime business group by breaking into c

33、omputer systems, writing viruses and _.(分数:7.00)填空项 1:_三、Part Listening Com(总题数:0,分数:0.00)四、Section A(总题数:4,分数:105.00)(1).A. He finds his history book difficult to understand.B. He has to read a lot of history books.C. He doesnt like the history course.D. He has lost his history book.(分数:7.00)A.B.C.

34、D.(2).A. The English teacher has not been busy.B. The woman has troubled the English teacher very much.C. The woman has never troubled the English teacher.D. The man has troubled the English teacher.(分数:7.00)A.B.C.D.(3).A. 6:15. B. 6:40. C. 5:35. D. 6:01.(分数:7.00)A.B.C.D.(4).A. At an airport. B. At

35、a train station.C. At a sports ground. D. At a bus stop.(分数:7.00)A.B.C.D.(5).A. Ed will be late. B. She hopes Ed wont come.C. She thinks Ed will be on time. D. Ed cant come.(分数:7.00)A.B.C.D.(1).A. Tony speaks too slowly. B. Tony speaks too fast.C. Tony doesnt come to the point. D. Tonys speech is no

36、t clear.(分数:7.00)A.B.C.D.(2).A. Walk round the corner to the hotel. B. Take a taxi to the hotel.C. Telephone the hotel for directions. D. Wait in the candy store.(分数:7.00)A.B.C.D.(3).A. She will accept exceptional excuses. B. The man has more excuses.C. She wont listen to any explanation. D. She was

37、 also overslept like the man.(分数:7.00)A.B.C.D.Questions 19 to 21 are based on the conversation you have just heard.(分数:21.00)(1).A. A new snack food. B. A type of fish.C. Ingredients of the food. D. Flavors of the food.(分数:7.00)A.B.C.D.(2).A. To cover the taste of fish. B. To make it look appealing.

38、C. To make it easy to digest. D. To give it a particular taste.(分数:7.00)A.B.C.D.(3).A. Its good appearance. B. Its good taste.C. Its good nutritional value. D. Its good advertisement.(分数:7.00)A.B.C.D.(1).A. In the Student Recreation Center. B. In the campus dining hall.C. In the university bookstore

39、. D. In a classroom.(分数:7.00)A.B.C.D.(2).A. Studying. B. Preparing snacks.C. Playing cards. D. Learning how to play bridge.(分数:7.00)A.B.C.D.(3).A. Miss his card game.B. Stay up too late.C. Take too heavy a work load next semester.D. Neglect his studies to play bridge.(分数:7.00)A.B.C.D.(4).A. She alre

40、ady knows how to play. B. She doesnt like to play games.C. She doesnt have a partner. D. She doesnt have enough free time.(分数:7.00)A.B.C.D.五、Section B(总题数:3,分数:70.00)Passage OneQuestions 26 to 28 are based on the passage you have just heard.(分数:21.00)(1).A. Madrid. B. London. C. Washington. D. Rome.

41、(分数:7.00)A.B.C.D.(2).A. Spain. B. Britain. C. The United States. D. Italy.(分数:7.00)A.B.C.D.(3).A. Praise London for cleaning off smog.B. Introduce the Clean Air Act.C. Illustrate the bad effects of smog to buildings.D. Appeal to American peoples actions against smog.(分数:7.00)A.B.C.D.Passage TwoQuest

42、ions 29 to 31 are based on the passage you have just heard.(分数:21.00)(1).A. Sort the mail. B. Answer the mail.C. Read the magazines. D. File important information.(分数:7.00)A.B.C.D.(2).A. Pay the bills right away.B. Read the magazines very quickly.C. Sort the articles into categories for later refere

43、nce.D. Stop buying magazines which you dont have time to read.(分数:7.00)A.B.C.D.(3).A. At least once a month. B. At least twice a month.C. At least once a year. D. At least twice a year.(分数:7.00)A.B.C.D.Passage ThreeQuestions 32 to 35 are based on the passage you have just heard.(分数:28.00)(1).A. It i

44、s in the heart of the city at 42nd Street and Fifth Avenue.B. It is in the heart of the city at 42nd Street and Sixth Avenue.C. It is in the heart of the city at 32nd Street and Fifth Avenue.D. It is in the heart of the city at 32nd Street and Sixth Avenue.(分数:7.00)A.B.C.D.(2).A. The library is in t

45、he busiest part of the city.B. The library has grass and trees around it.C. The roof of the main reading room is forty-one feet high.D. Its rooms are very large.(分数:7.00)A.B.C.D.(3).A. 13 million. B. 30 million. C. 14 million. D. 40 million.(分数:7.00)A.B.C.D.(4).A. It is in danger. B. To raise more m

46、oney.C. To continue its work. D. To save money.(分数:7.00)A.B.C.D.六、Section C(总题数:1,分数:77.00)When we think of oil, the part of the world that comes to mind first may be the Middle East. But (36) development takes place worldwide.Nigeria, for example, is the largest oil producer in Africa and the eleve

47、nth largest producer in the world. Russia is the worlds second largest (37) of oil and the top (38) of natural gas.In 1960, Iran, Iraq, Kuwait, Saudi Arabia and Venezuela (39) the Organization of the Petroleum Exporting Countries. Its (40) may have reached a high point during the oil crisis (41) to

48、the 1973 Arab-Israeli war. Arab oil producers (42) the United States, Western Europe and Japan because of their support for Israel. Since then, new discoveries and increased production in areas including countries of the former Soviet Union have provided more oil. Today OPEC has twelve members. The

49、newest is Angola, which joined in 2007.High oil prices have brought new attention to OPEC. Its members produce about forty percent of the worlds oil. But two of the worlds top three oil exporters, Russia and Norway, are not OPEC members.National oil companies are (43) to control about eighty percent of the worlds oil supply. (44) .President Hugo Chavez has moved to nationalize oil operations in Venezue

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1