ImageVerifierCode 换一换
格式:DOC , 页数:22 ,大小:77.50KB ,
资源ID:470584      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-470584.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]专业英语八级模拟试卷665及答案与解析.doc)为本站会员(bowdiet140)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]专业英语八级模拟试卷665及答案与解析.doc

1、专业英语八级模拟试卷 665及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.

2、 When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Computer Crime I. Introduction Current situation; the increase in number and type of computer crime II .

3、Features of computer criminals A. relatively honest B. gender (1) _ (1)_ 1. most being males 2. females being accomplices C. aged between 14 and (2) _ (2)_ D. bright, eager, highly motivated, adventuresome E. (3)_profiles: ranging from young teens to (3)_ elders, from black to white, from short to t

4、all III. Definitions of computer crimechanging over (4)_ (4)_ A. once defined as a form of white-collar crime committed inside a computer system B. a federal crime defined as hacking into credit and other data bases protected by federal (5)_statutes (5)_ C. unauthorized access to computers to obtain

5、 money, goods or services or classified information IV. (6) _of computer crime (6)_ A. swindling or stealing of money e. g. The Well Fargo Bank discovered an employee using the bank computer to embezzle $21.3 million. B. credit card (7)_ (7)_ e. g. A computer hacker gained illegal access to a credit

6、 data base and applied for credit cards to issue money from ATMs. C. (8) _of computer time (8)_ e. g. Excessive computer game time in business means stealing of work time. V . Protection (9)_ (9)_ hardware identification (10)_software (10)_ disconnecting critical bank applications proper internal co

7、ntrols SECTION B INTERVIEW Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions.

8、Now listen to the interview. 11 Which of the following statements is NOT true about Armstrongs STAR? ( A) A stands for actions, ( B) T stands for titles. ( C) S stands for situations. ( D) R stands for results. 12 Armstrong suggests all the following preparations EXCEPT _. ( A) looking at the mirror

9、. ( B) practicing simulated interviews. ( C) practicing answering questions. ( D) finding some of your strong points. 13 What shall an interviewee do after the interview according to Armstrong? ( A) Wait for the recruiters notice. ( B) Revisit the recruiter for the result. ( C) Send a letter of than

10、ks. ( D) Give the interviewer a call to confirm their resolution. 14 Interviewers nowadays are asking questions that are going to _. ( A) get at more specific things. ( B) get at more general things. ( C) get at more personal things. ( D) get at more public things. 15 When asking you to give a speci

11、fic example of a time when a co-worker criticized your work, the interviewers _. ( A) want to know about your temper. ( B) focus on your assertiveness. ( C) care about your teamwork skills. ( D) doubt about your honesty. SECTION C NEWS BROADCAST Directions: In this section you will hear everything O

12、NCE ONLY. Listen carefully and then answer the questions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 What is the Paris forum expected to achieve? ( A) Ways to cooperate within the Major Economies will be found. ( B) A successor to the Kyoto glo

13、bal warming protocol will be agreed to. ( C) Ways to reduce human-induced greenhouse gas emissions will be found. ( D) Common ground on some issues concerning climate change will be found. 17 Where will the third forum of three Major Economies meetings be held? ( A) Kyoto. ( B) Mexico. ( C) Copenhag

14、en. ( D) The United States. 17 Packaging It is said that the public and Congressional concern about deceptive packaging rumpus started because Senator Hart discovered that the boxes of cereals consumed by him, Mrs. Hart, and their children were be- coming higher and narrower, with a decline of net w

15、eight from 12 to 10.5 ounces, without any reduction in price. There were still twelve biscuits, but they had been reduced in size. Later, the senator rightly complained of a store - bought pie in a handsomely illustrated box that pictured, in a single slice, almost as many cherries as there were in

16、the whole pie. The manufacturer who increases the unit price of his product by changing his package size to lower the quantity delivered can, without undue hardship, put his product into boxes, bags, and tins that will contain even 4 - ounce, 8 - ounce, one - pound, and two - pound quantities of bre

17、akfast foods, cake mixes, etc. A study of drugstore and supermarket shelves will convince any observer that all possible sizes and shapes of boxes, jars, bottles, and tins are in use at the same time and, as the package journals show, week by week, there is never any hesitation in introducing a new

18、size and shape of box or bottle when it aids in product differentiation. The producers of packaged products argue strongly against changing sizes of packages to contain even weights and volumes, but no one in the trade comments unfavorably on the huge costs incurred by end- less changes of package s

19、izes, materials, shape, art work, and net weights that are used for improving a products market position. When a packaging expert explained that he was able to multiply the price of hard sweets by 2.5, from 1 dollar to 250 dollars by changing to a fancy jar, or that he had made a 5 - ounce bottle lo

20、ok as though it held 8 ounces, he was in effect telling the public that packaging can be a very expensive luxury. It evidently does come high, when an average family pays about 200 dollars a year for bottles, cans, boxes, jars, and other, containers, most of which can t be used for anything but stuf

21、fing the garbage can. 18 Consumers are concerned about the changes in the package size. mainly because _. ( A) this entails an increase in the cost of packaging ( B) they have to pay for the cost of changing package sizes ( C) the unit price for a product often rises as a result ( D) they hate to se

22、e any changes in things they are familiar with 19 The author is critical mainly of _. ( A) inferior packaging ( B) the changes in package size ( C) exaggerated illustrations on packages ( D) dishonest packaging 一、 PART III GENERAL KNOWLEDGE (10 MIN) Directions: There are ten multiple-choice question

23、s in this section. Choose the best answer to each question. 20 The second longest and most important river in Britain is ( A) the Severn River. ( B) the Thames River. ( C) River Clyde. ( D) the Mersey River. 21 Which of the following about the Wars of the Roses is NOT true? ( A) The name was coined

24、by a 19th century novelist. ( B) The Wars referred to the battles between the House of Lancaster and the House of York. ( C) After the wars, the Tudor monarch ruled England. ( D) The common people were deeply engaged in the Wars. 22 Bacons_is the first example of that genre in English literature, wh

25、ich has been recognized as an important landmark in the development of English prose. ( A) The Advancement of Learning ( B) Essays ( C) The New Atlantis ( D) Volpone 23 The biggest state in Australia is_. ( A) South Australia ( B) Western Australia ( C) Tasmania ( D) Victoria 24 What is the characte

26、r of British labor force? ( A) homogeneous ( B) creative ( C) imaginary ( D) hard working 25 What are the most important natural resources in Canada? ( A) Forest resources. ( B) Mineral resources. ( C) Water resources. ( D) Agricultural resources. 26 _is one of the great playwrights in the school of

27、 Absurd Theater. ( A) William Shakespeare ( B) Ben Johnson ( C) Samuel Beckett ( D) George Bernard Shaw 27 Modern Linguists give priority to _ rahter than _. ( A) prescriptiveness; descriptiveness ( B) the spoken language; the written language ( C) grammar; context ( D) structure; form 28 The only A

28、merican president elected for a third term is _. ( A) George Washington ( B) Abraham Lincoln ( C) Franklin Roosevelt ( D) Ronald Reagan 29 After The Adventures of Tom Sawyer, Twain gives a literary independence to Toms buddy Huck in a book entitled _. ( A) Life on the Mississippi ( B) The Gilded Age

29、 ( C) The Adventures of Huckleberry Finn ( D) A Connecticut Yankee in King Arthurs Court 二、 PART IV PROOFREADING that is all relative. But since there is little solid information on what is the optimal intake of any essential nutrient in healthy individuals, it would be impossible to give guidelines

30、 that take these proportional needs into the (7)_ account. Just as with other drugs, the relation to (8)_ different vitamin dosages varies, with some people better able than others to tolerate large amounts. While we do know that very specifically what the toxic level (9)_ is for vitamins A and D, w

31、e are far less sure about vitamin E, even though it, too, is fat-soluble, and we still dont understand the water-soluble vitamin, the C (10)_ and the B groups, which the body cant store. 30 (1) 31 (2) 32 (3) 33 (4) 34 (5) 35 (6) 36 (7) 37 (8) 38 (9) 39 (10) SECTION A CHINESE TO ENGLISH Directions: T

32、ranslate the following text into English. 40 夜是静寂的,柔和的。从对面我听呸见一点声音。香港似乎闭了它的大口。介是当我注意到那一座光芒万丈的星的山的时候,我又仿佛听见那许多灯光的私语了。因为船的移动。灯光也似乎移动起来。而且电车汽车上的灯也在飞跑。我看见它们时明时暗,就像人在眨眼。或者像它们在追逐,在说话。我的视觉和听觉混合起来。我仿佛在用眼睛听了。那一座星的山并不是沉默的,在那里正奏着伟大的交响乐。 SECTION B ENGLISH TO CHINESE Directions: Translate the following text into

33、 Chinese. 41 Of course, making sure its as easy as possible for the media to get their material back to base is usually in the interest of the White House. It not only provides a transcript of every presidential utterance and background information on every place hes visiting, it also invests a grea

34、t deal of time and effort in whats known in the trade as “spinning“. A steady stream of administration officials and foreign-policy experts circulates in the pressroom, seeking to cast the Presidents word in the best possible light. The spinners gravitate most readily towards the television networks

35、 and the most important American newspapers. Its not uncommon to see a correspondent composing a dispatch on a personal computer with a White House official at his or her side, should any extra advice or information be required. Despite, or at times because of, such close attention, relations betwee

36、n the White House and its traveling press corps are seldom on an even keel for long. Ruffled feathers have to be smoothed and confrontations resolved. On such occasions, small gestures can make a big difference. 三、 PART VI WRITING (45 MIN) Directions: Write a composition of about 400 words on the fo

37、llowing topic. 41 Physical recreation and intellectual activities are two important ways people usually take in their leisure time. Then which one is more preferable for you? Write a composition of about 400 words on the following topic: 1. Physical Recreation and Intellectual Activities In the firs

38、t part of your writing you should present your thesis statement, and in the second part you should support the thesis statement with appropriate details. In the last part you should bring what you have written to a natural conclusion or a summary. Marks will be awarded for content, organization, gra

39、mmar and appropriateness. Failure to follow the above instructions may result in a loss of marks. Write your composition on ANSWER SHEET FOUR. 专业英语八级模拟试卷 665答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, ta

40、ke notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Us

41、e the blank sheet for note-taking. 0 【听力原文】 Computer Crime Good morning, todays lecture is the very first of a series of lectures on types of modern crimes, so Id like to discuss the first typecomputer crime right now. As computer crimes are getting more and more rampant, laws must be passed to addr

42、ess the increase in the number and types of those crimes. Over the last twenty years, large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more

43、 people now have computers at home and at the office. So, who committed computer crimes? Whats the definition of computer crime and what forms does computer crime take on? And what are our protection measures? We shall answer the preceding questions one by one. First, what kinds of people tend to co

44、mmit computer crimes? According to experts, computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, although later they ar

45、e becoming more aggressive. Computer Criminals tend to usually be between the ages of 14-30, (2) they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. It is tempting to liken computer criminals to other criminals, ascribing characteristics someh

46、ow different from normal individuals, but that is not the case. It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path. There is no actual profile of a computer criminal because they range from young teens to elders, from bl

47、ack to white, from short to tall. (3) Second, we shall discuss the evolutionary definition of computer crime. Definitions of computer crime have changed over the years as the users and misusers of computers have expanded into new areas. (4) When computers were first introduced into businesses, compu

48、ter crime was defined simply as a form of white-collar crime committed inside a computer system. Congress has been reacting to the outbreak of computer crimes. The U. S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into c

49、redit and other data bases protected by federal privacy statutes. (5) This bill is generally creating several categories of federal crimes for unauthorized access to computers to obtain money, goods or services or classified information. Third, computer crimes can take on many forms. The first form is swindling or stealing of money is one of

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1