1、专业英语八级模拟试卷 665及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.
2、 When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Computer Crime I. Introduction Current situation; the increase in number and type of computer crime II .
3、Features of computer criminals A. relatively honest B. gender (1) _ (1)_ 1. most being males 2. females being accomplices C. aged between 14 and (2) _ (2)_ D. bright, eager, highly motivated, adventuresome E. (3)_profiles: ranging from young teens to (3)_ elders, from black to white, from short to t
4、all III. Definitions of computer crimechanging over (4)_ (4)_ A. once defined as a form of white-collar crime committed inside a computer system B. a federal crime defined as hacking into credit and other data bases protected by federal (5)_statutes (5)_ C. unauthorized access to computers to obtain
5、 money, goods or services or classified information IV. (6) _of computer crime (6)_ A. swindling or stealing of money e. g. The Well Fargo Bank discovered an employee using the bank computer to embezzle $21.3 million. B. credit card (7)_ (7)_ e. g. A computer hacker gained illegal access to a credit
6、 data base and applied for credit cards to issue money from ATMs. C. (8) _of computer time (8)_ e. g. Excessive computer game time in business means stealing of work time. V . Protection (9)_ (9)_ hardware identification (10)_software (10)_ disconnecting critical bank applications proper internal co
7、ntrols SECTION B INTERVIEW Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions.
8、Now listen to the interview. 11 Which of the following statements is NOT true about Armstrongs STAR? ( A) A stands for actions, ( B) T stands for titles. ( C) S stands for situations. ( D) R stands for results. 12 Armstrong suggests all the following preparations EXCEPT _. ( A) looking at the mirror
9、. ( B) practicing simulated interviews. ( C) practicing answering questions. ( D) finding some of your strong points. 13 What shall an interviewee do after the interview according to Armstrong? ( A) Wait for the recruiters notice. ( B) Revisit the recruiter for the result. ( C) Send a letter of than
10、ks. ( D) Give the interviewer a call to confirm their resolution. 14 Interviewers nowadays are asking questions that are going to _. ( A) get at more specific things. ( B) get at more general things. ( C) get at more personal things. ( D) get at more public things. 15 When asking you to give a speci
11、fic example of a time when a co-worker criticized your work, the interviewers _. ( A) want to know about your temper. ( B) focus on your assertiveness. ( C) care about your teamwork skills. ( D) doubt about your honesty. SECTION C NEWS BROADCAST Directions: In this section you will hear everything O
12、NCE ONLY. Listen carefully and then answer the questions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 What is the Paris forum expected to achieve? ( A) Ways to cooperate within the Major Economies will be found. ( B) A successor to the Kyoto glo
13、bal warming protocol will be agreed to. ( C) Ways to reduce human-induced greenhouse gas emissions will be found. ( D) Common ground on some issues concerning climate change will be found. 17 Where will the third forum of three Major Economies meetings be held? ( A) Kyoto. ( B) Mexico. ( C) Copenhag
14、en. ( D) The United States. 17 Packaging It is said that the public and Congressional concern about deceptive packaging rumpus started because Senator Hart discovered that the boxes of cereals consumed by him, Mrs. Hart, and their children were be- coming higher and narrower, with a decline of net w
15、eight from 12 to 10.5 ounces, without any reduction in price. There were still twelve biscuits, but they had been reduced in size. Later, the senator rightly complained of a store - bought pie in a handsomely illustrated box that pictured, in a single slice, almost as many cherries as there were in
16、the whole pie. The manufacturer who increases the unit price of his product by changing his package size to lower the quantity delivered can, without undue hardship, put his product into boxes, bags, and tins that will contain even 4 - ounce, 8 - ounce, one - pound, and two - pound quantities of bre
17、akfast foods, cake mixes, etc. A study of drugstore and supermarket shelves will convince any observer that all possible sizes and shapes of boxes, jars, bottles, and tins are in use at the same time and, as the package journals show, week by week, there is never any hesitation in introducing a new
18、size and shape of box or bottle when it aids in product differentiation. The producers of packaged products argue strongly against changing sizes of packages to contain even weights and volumes, but no one in the trade comments unfavorably on the huge costs incurred by end- less changes of package s
19、izes, materials, shape, art work, and net weights that are used for improving a products market position. When a packaging expert explained that he was able to multiply the price of hard sweets by 2.5, from 1 dollar to 250 dollars by changing to a fancy jar, or that he had made a 5 - ounce bottle lo
20、ok as though it held 8 ounces, he was in effect telling the public that packaging can be a very expensive luxury. It evidently does come high, when an average family pays about 200 dollars a year for bottles, cans, boxes, jars, and other, containers, most of which can t be used for anything but stuf
21、fing the garbage can. 18 Consumers are concerned about the changes in the package size. mainly because _. ( A) this entails an increase in the cost of packaging ( B) they have to pay for the cost of changing package sizes ( C) the unit price for a product often rises as a result ( D) they hate to se
22、e any changes in things they are familiar with 19 The author is critical mainly of _. ( A) inferior packaging ( B) the changes in package size ( C) exaggerated illustrations on packages ( D) dishonest packaging 一、 PART III GENERAL KNOWLEDGE (10 MIN) Directions: There are ten multiple-choice question
23、s in this section. Choose the best answer to each question. 20 The second longest and most important river in Britain is ( A) the Severn River. ( B) the Thames River. ( C) River Clyde. ( D) the Mersey River. 21 Which of the following about the Wars of the Roses is NOT true? ( A) The name was coined
24、by a 19th century novelist. ( B) The Wars referred to the battles between the House of Lancaster and the House of York. ( C) After the wars, the Tudor monarch ruled England. ( D) The common people were deeply engaged in the Wars. 22 Bacons_is the first example of that genre in English literature, wh
25、ich has been recognized as an important landmark in the development of English prose. ( A) The Advancement of Learning ( B) Essays ( C) The New Atlantis ( D) Volpone 23 The biggest state in Australia is_. ( A) South Australia ( B) Western Australia ( C) Tasmania ( D) Victoria 24 What is the characte
26、r of British labor force? ( A) homogeneous ( B) creative ( C) imaginary ( D) hard working 25 What are the most important natural resources in Canada? ( A) Forest resources. ( B) Mineral resources. ( C) Water resources. ( D) Agricultural resources. 26 _is one of the great playwrights in the school of
27、 Absurd Theater. ( A) William Shakespeare ( B) Ben Johnson ( C) Samuel Beckett ( D) George Bernard Shaw 27 Modern Linguists give priority to _ rahter than _. ( A) prescriptiveness; descriptiveness ( B) the spoken language; the written language ( C) grammar; context ( D) structure; form 28 The only A
28、merican president elected for a third term is _. ( A) George Washington ( B) Abraham Lincoln ( C) Franklin Roosevelt ( D) Ronald Reagan 29 After The Adventures of Tom Sawyer, Twain gives a literary independence to Toms buddy Huck in a book entitled _. ( A) Life on the Mississippi ( B) The Gilded Age
29、 ( C) The Adventures of Huckleberry Finn ( D) A Connecticut Yankee in King Arthurs Court 二、 PART IV PROOFREADING that is all relative. But since there is little solid information on what is the optimal intake of any essential nutrient in healthy individuals, it would be impossible to give guidelines
30、 that take these proportional needs into the (7)_ account. Just as with other drugs, the relation to (8)_ different vitamin dosages varies, with some people better able than others to tolerate large amounts. While we do know that very specifically what the toxic level (9)_ is for vitamins A and D, w
31、e are far less sure about vitamin E, even though it, too, is fat-soluble, and we still dont understand the water-soluble vitamin, the C (10)_ and the B groups, which the body cant store. 30 (1) 31 (2) 32 (3) 33 (4) 34 (5) 35 (6) 36 (7) 37 (8) 38 (9) 39 (10) SECTION A CHINESE TO ENGLISH Directions: T
32、ranslate the following text into English. 40 夜是静寂的,柔和的。从对面我听呸见一点声音。香港似乎闭了它的大口。介是当我注意到那一座光芒万丈的星的山的时候,我又仿佛听见那许多灯光的私语了。因为船的移动。灯光也似乎移动起来。而且电车汽车上的灯也在飞跑。我看见它们时明时暗,就像人在眨眼。或者像它们在追逐,在说话。我的视觉和听觉混合起来。我仿佛在用眼睛听了。那一座星的山并不是沉默的,在那里正奏着伟大的交响乐。 SECTION B ENGLISH TO CHINESE Directions: Translate the following text into
33、 Chinese. 41 Of course, making sure its as easy as possible for the media to get their material back to base is usually in the interest of the White House. It not only provides a transcript of every presidential utterance and background information on every place hes visiting, it also invests a grea
34、t deal of time and effort in whats known in the trade as “spinning“. A steady stream of administration officials and foreign-policy experts circulates in the pressroom, seeking to cast the Presidents word in the best possible light. The spinners gravitate most readily towards the television networks
35、 and the most important American newspapers. Its not uncommon to see a correspondent composing a dispatch on a personal computer with a White House official at his or her side, should any extra advice or information be required. Despite, or at times because of, such close attention, relations betwee
36、n the White House and its traveling press corps are seldom on an even keel for long. Ruffled feathers have to be smoothed and confrontations resolved. On such occasions, small gestures can make a big difference. 三、 PART VI WRITING (45 MIN) Directions: Write a composition of about 400 words on the fo
37、llowing topic. 41 Physical recreation and intellectual activities are two important ways people usually take in their leisure time. Then which one is more preferable for you? Write a composition of about 400 words on the following topic: 1. Physical Recreation and Intellectual Activities In the firs
38、t part of your writing you should present your thesis statement, and in the second part you should support the thesis statement with appropriate details. In the last part you should bring what you have written to a natural conclusion or a summary. Marks will be awarded for content, organization, gra
39、mmar and appropriateness. Failure to follow the above instructions may result in a loss of marks. Write your composition on ANSWER SHEET FOUR. 专业英语八级模拟试卷 665答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, ta
40、ke notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Us
41、e the blank sheet for note-taking. 0 【听力原文】 Computer Crime Good morning, todays lecture is the very first of a series of lectures on types of modern crimes, so Id like to discuss the first typecomputer crime right now. As computer crimes are getting more and more rampant, laws must be passed to addr
42、ess the increase in the number and types of those crimes. Over the last twenty years, large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more
43、 people now have computers at home and at the office. So, who committed computer crimes? Whats the definition of computer crime and what forms does computer crime take on? And what are our protection measures? We shall answer the preceding questions one by one. First, what kinds of people tend to co
44、mmit computer crimes? According to experts, computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, although later they ar
45、e becoming more aggressive. Computer Criminals tend to usually be between the ages of 14-30, (2) they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. It is tempting to liken computer criminals to other criminals, ascribing characteristics someh
46、ow different from normal individuals, but that is not the case. It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path. There is no actual profile of a computer criminal because they range from young teens to elders, from bl
47、ack to white, from short to tall. (3) Second, we shall discuss the evolutionary definition of computer crime. Definitions of computer crime have changed over the years as the users and misusers of computers have expanded into new areas. (4) When computers were first introduced into businesses, compu
48、ter crime was defined simply as a form of white-collar crime committed inside a computer system. Congress has been reacting to the outbreak of computer crimes. The U. S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into c
49、redit and other data bases protected by federal privacy statutes. (5) This bill is generally creating several categories of federal crimes for unauthorized access to computers to obtain money, goods or services or classified information. Third, computer crimes can take on many forms. The first form is swindling or stealing of money is one of
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1