ImageVerifierCode 换一换
格式:DOC , 页数:20 ,大小:132.50KB ,
资源ID:1456357      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1456357.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(大学英语四级(2013年12月考试改革适用)模拟试卷251及答案解析.doc)为本站会员(jobexamine331)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

大学英语四级(2013年12月考试改革适用)模拟试卷251及答案解析.doc

1、大学英语四级(2013 年 12月考试改革适用)模拟试卷 251及答案解析(总分:118.00,做题时间:90 分钟)一、Writing(总题数:2,分数:4.00)1.Part I Writing(分数:2.00)_2.For this part, you are allowed 30 minutes to write a short essay entitled Computers in Our Life following the outline given below. You should write at least 120 words but no more than 180 w

2、ords. 1当今,计算机已进入千家万户。 2计算机给我们的生活带来了许多方便。 3但同时计算机也给我们带来了一些麻烦。(分数:2.00)_二、Listening Comprehens(总题数:12,分数:50.00)3.Part II Listening Comprehension_4.Section A_A.Islamist militants are still in control of the town.B.French forces have entered the town.C.French are going to land at the airport.D.Islamist

3、militants are attacking the airport.A.To control Kidal airport.B.To protect the town.C.To protect the capital Bamako.D.To fight against Islamist militants.A.A client.B.A bank manager.C.The police.D.Bank headquarters.A.A month before the crime was discovered.B.A day before the crime was discovered.C.

4、A day after the police started investigation.D.A month after he transferred the money.A.They went to a remote area.B.Their fishing boats clashed.C.They tried to repair their boats.D.They decided to stay in the boats.A.On supplies they brought with them.B.On supplies sent to them by rescue teams.C.On

5、 supplies left at the military base.D.Not mentioned in the passage.A.By helicopter.B.By boat.C.By radio contact.D.By a search team.5.Section B_A.Its hereditary.B.The shampoo he used caused it.C.He combs his hair too much.D.He is old enough to lose hair.A.Use some special shampoo.B.Wear a wig.C.Don t

6、 try to comb hair over the bald or thin patch.D.Go to the doctor for advice.A.Over the radio.B.At a doctor s office.C.At the man s house.D.At a drug store.A.It suits him.B.It looks ridiculous.C.It looks old.D.It s getting worse.A.Friends.B.Coworkers.C.Interviewer and interviewee.D.Doctor and patient

7、.A.He thought Art was useless.B.He was offered a job in a big accounting firm.C.He wanted to go to London to study Art.D.He wanted to do some interesting things.A.The job dont have good prospects.B.He earns fairly a little.C.He found a better job.D.He cant get interested in the job.A.Doing a lot of

8、photography.B.Going to concerts frequently.C.Playing traditional jazz and folk music.D.Traveling in Africa.6.Section C_A.The mouth.B.The throat.C.The nose.D.A computer.A.How much air normally goes through your nose when you talk.B.The force of air that comes from the lungs.C.The highness or lowness

9、of sounds.D.The length of speech for each sound.A.Decibels(分贝).B.Small fractions per sound.C.Cycles per sound.D.The force of air.A.Short, tiring, and often dangerous.B.Long, tiring but not dangerous.C.Short but dangerous.D.Long, weary and often dangerous.A.For pleasure and excitement.B.For new place

10、s where their herds could feed.C.For animals.D.For tree trunks.A.Bicycles, cars, trains, and ships.B.Bicycles, cars, trains, and planes.C.Cars, trains, ships, and planes.D.Ferries, cars, trains, and planes.A.Because there are no signs to direct them.B.Because no tour guides are available.C.Because a

11、ll the buildings in the city look alike.D.Because the university is everywhere in the city.A.They set their own exams.B.They select their own students.C.They award their own degrees.D.They organize their own laboratory work.A.Most of them has a long history.B.Many of them are specialized libraries.C

12、.They house more books than any other university library.D.They each have a copy of every book published in Britain.A.Very few of them are engaged in research.B.They were not awarded degrees until 1948.C.They have outnumbered male students.D.They were not treated equally until 1881.三、Reading Compreh

13、ensio(总题数:8,分数:60.00)7.Part III Reading Comprehension_8.Section A_These days, people who do 1work often receive far more money than people who work in offices. People who work in offices are frequently referred to as “white-collar“ workers for the simple reason that they usually wear a(n) 2and tie t

14、o go to work. Such is human nature, that a great many people are often willing to sacrifice higher pay for the 3of becoming white-collar workers. This can give 4to curious situations, as it did in the case of Alfred Bloggs who worked as a(n) 5for the Ellesmere Corporation. When he got married, Alf w

15、as too 6to say anything to his wife about his job. He simply told her that he worked for the Corporation. Every morning, he left home dressed in a smart black suit. He then 7into overalls and spent the next eight hours as a dustman. 8returning home at night, he took a shower and changed back into hi

16、s suit. Alf did this for over two years and his fellow dustmen kept his secret. Alf s wife has never 9that she married a dustman and she never will, for Alf has just found another job. He will soon be working in an office. He will be earning only half as much as he used to, but he feels that his ris

17、e in 10is well worth the loss of money. From now on, he will wear a suit all day and others will call him “Mr. Bloggs“, not “Alf. A)knowledge B)rise C)discovered D)privilege E)embarrassed F)collar G)strengthened H)envious I)status J)changed K)before L)mental M)dustman N)manual O)willing(分数:20.00)填空项

18、 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_10.Section B_Identity theft A)Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person s personal data in some way that involves fraud or deception, t

19、ypically for economic gain. B)The numbers associated with identity theft are beginning to add up fast these days. A recent General Accounting Office report estimates that as many as 750, 000 Americans are victims of identity theft every year. And that number may be low, as many people choose not to

20、report the crime even if they know they have been victimized. C)Identity theft is “an absolute epidemic“, states Robert Ellis Smith, a respected author and advocate of privacy, “Its certainly picked up in the last four or five years. Its worldwide. It affects everybody, and there s very little you c

21、an do to prevent it and, worst of all, you can t detect it until it s probably too late.“ D)Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data, especially your social security number, your bank account or credit card number, your t

22、elephone calling card number, and other valuable identifying data, can be used, if they fall into the wrong hands, to personally profit at your expense. In the United States and Canada, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial a

23、ccounts, or, in the worst cases, taken over their identities altogether, running up vast debts and committing crimes while using the victims names. In many cases, a victims losses may include not only out-of-pocket financial losses, but substantial additional financial costs associated with trying t

24、o restore his reputation in the community and correcting erroneous information for which the criminal is responsible. E)According to the FBI, identity theft is the number one fraud committed on the Internet. So how do job seekers protect themselves while continuing to circulate their resumes online?

25、 The key to a successful online job search is learning to manage the risks. Here are some tips for staying safe while conducting a job search on the Internet. F)Check for a privacy policy. If you are considering posting your resume online, make sure the job search site you are considering has a priv

26、acy policy, like CareerB. The policy should spell out how your information will be used, stored and whether or not it will be shared. You may want to think twice about posting your resume on a site that automatically shares your information with others. You could be opening yourself up to unwanted c

27、alls from solicitors(推销员). When reviewing the sites privacy policy, youll be able to delete your resume just as easily as you posted it. You wont necessarily want your resume to remain out there on the Internet once you land a job. Remember, the longer your resume remains posted on a job board, the

28、more exposure, both positive and not-so-positive, it will receive. G)Take advantages of site features. Lawful job search sites offer levels of privacy protection. Before posting your resume, carefully consider your job search objectives and the level of risk you are willing to assume. CareerB, for e

29、xample, offers three levels of privacy from which job seekers can choose. The first is standard posting. This option gives job seekers who post their resumes the most visibility to the broadest employer audience possible. The second is anonymous(匿名的)posting. This allows job seekers the same visibili

30、ty as those in the standard posting category without any of their contact information being displayed. Job seekers who wish to remain anonymous but want to share some other information may choose which pieces of contact information to display. The third is private posting. This option allows a job s

31、eeker to post a resume without having it searched by employers. Private posting allows job seekers to quickly and easily apply for jobs that appear on CareerB without retyping their information. H)Safeguard your identity. Career experts say that one of the ways job seekers can stay safe while using

32、the Internet to search out jobs is to conceal their identities. Replace your name on your resume with a generic(泛指的)identifier, such as “Intranet Developer Candidate“, or “Experienced Marketing Representative“. You should also consider eliminating the name and location of your current employer. Depe

33、nding on your title, it may not be all that difficult to determine who you are once the name of your company is provided. Use a general description of the company such as “Major auto manufacturer, “ or “International packaged goods supplier.“ If your job title is unique, consider using the generic e

34、quivalent instead of the exact title assigned by your employer. I)Establish an email address for your search. Another way to protect your privacy while seeking employment online is to open up an email account specifically for your online job search. This will safeguard your existing email box in the

35、 event someone you dont know gets hold of your email address and shares it with others. Using an email address specifically for your job search also eliminates the possibility that you will receive unwelcome emails in your primary mailbox. When naming your new email address, be sure that it doesn t

36、contain references to your name or other information that will give away your identity. The best solution is an email address that is relevant to the job you are seeking such as salesmgr2QQ. J)Protect your references. If your resume contains a section with the names and contact information of your r

37、eferences, take it out. There s no sense in safeguarding your information while sharing private contact information of your references. K)Keep confidential(机密的)information confidential. Do not, under any circumstances, share your social security, drivers license, and bank account numbers or other pe

38、rsonal information, such as race or eye color. Honest employers do not need this information with an initial application. Don t provide this even if they say they need it in order to conduct a background check. This is one of the oldest tricks in the bookdont fall for it.(分数:20.00)(1).In order to re

39、store their reputation, victims of identity theft may suffer additional financial losses.(分数:2.00)填空项 1:_(2).Job seekers are advised to describe the company they are serving at the time in a general way but not giving an exact name.(分数:2.00)填空项 1:_(3).Learn how to avoid the risks, if one hopes to se

40、ek jobs online safely.(分数:2.00)填空项 1:_(4).Job seekers who want to share part of their information while remain anonymous may choose pieces of contact information to display.(分数:2.00)填空项 1:_(5).The number 750, 000 is not exact, people who become victims of identity theft each year may be more than it

41、.(分数:2.00)填空项 1:_(6).Identity theft is spreading around the world and difficult to detect.(分数:2.00)填空项 1:_(7).A safer way to search a job online is to use your email account.(分数:2.00)填空项 1:_(8).Make sure your email address wont be named in a way that could let out your personal information.(分数:2.00)

42、填空项 1:_(9).Resumes posted online for a long time will increase the risk of becoming victims of identity theft.(分数:2.00)填空项 1:_(10).Honest employers wont ask their initial job applicants to reveal their social security account or bank account numbers.(分数:2.00)填空项 1:_11.Section C_Man is endlessly inve

43、ntive. But his greatest invention is non-invention, the skill of transmitting intact(完美无损的)and unchanged from one generation to the next the fundamental ways of doing things which he learned from the generation which preceded him. Children are conceived and reared, houses built, fish caught, and ene

44、mies killed in much the same way by most of the members of any society: and these patterns are maintained for relatively long periods of time. From the perspective of those in each new generation, and for the society as an enduring, historical entity(统一的), this process of cultural transmission yield

45、s enormous economy. Thanks to it, each generation need not rediscover at great cost in time and subject to great risk of failure, what those coming before have already learned. Not only is knowledge thus conserved, but the basis for communal life, resting on common information and understanding is thus established. Since all those in each generation receive more or less the same cultural heritage from the preceding generation, they can more easily relate to one another and more effectively c

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1