ImageVerifierCode 换一换
格式:DOC , 页数:22 ,大小:83KB ,
资源ID:470598      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-470598.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]专业英语八级模拟试卷681及答案与解析.doc)为本站会员(livefirmly316)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc

1、专业英语八级模拟试卷 681及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.

2、 When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Computer Crime . Introduction Current situation: the increase in number and type of computer crime . Feat

3、ures of computer criminals A. relatively honest B. gender【 1】 _ 1. most being males 2. females being accomplices C. aged between 14 and【 2】 _ D. bright, eager, highly motivated, adventuresome E.【 3】 _profiles: ranging from young teens to eiders, from black to white, from short to tall . Definitions

4、of computer crimechanging over【 4】 _A. once defined as a form of white-collar crime committed inside a computer systemB. a federal crime defined as hacking into credit and other data bases protected by federal【 5】 _statutesC. unauthorized access to computers to obtain money, goods or services or cla

5、ssified information .【 6】 _of computer crimeA. swindling or stealing of moneye.g. The Well Fargo Bank discovered an employee using the bank computer to embezzle $ 21.3 million.B. credit card【 7】 _e.g. A computer hacker gained illegal access to a credit data base and applied for credit cards to issue

6、 money from ATMs.C.【 8】 _of computer timee.g. Excessive computer game time in business means stealing of work time. . Protection【 9】 _ hardware identification 【 10】 _software disconnecting critical bank applications proper internal controls SECTION B INTERVIEW Directions: In this section you will he

7、ar everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions. Now listen to the interview. 11 Mr. Swift has marked some lines on

8、 the page because _. ( A) he thought Mr. Sun has written the letter well ( B) there is something wrong about the grammer ( C) they can be improved according to western culture ( D) these are not polite ways of expression 12 Which of the following did not occur in the conversation? ( A) The year when

9、 Mr. Sun has graduated. ( B) How Mr. Sun left his school. ( C) The name of the school from which Mr. Sun has graduated. ( D) Mr. Sun s major in the school. 13 According to Mr. Swift ,which is the polite and appropriate way of writing? ( A) To fill the page with beautiful while extraneous expressions

10、. ( B) To make things as easy as possible for your addressee. ( C) To express your thanks or apologies again and again. ( D) All of the above. 14 In the conversation, Mr. Sun said “Maybe I shall forget the whole thing“. What is the exact meaning? ( A) He thinks to write anotehr letter. ( B) He think

11、s to give up writing such a letter. ( C) He thinks to forget all about Mr. Swift s directons. ( D) He thinks to forget all about this unpleasant experience. 15 According to the conversation, an application letter should _. ( A) be a long one with all possible information about the applicant ( B) be

12、a brief one with the purpose of writing made clear ( C) be a brief one with the purpose of writing made clear, together with a resume ( D) all of the above ways are welcome SECTION C NEWS BROADCAST Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the q

13、uestions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 Which of the following is TRUE? ( A) Hosni Mubarak is to have an operation. ( B) Hosni Mubarak refuses to eat anything. ( C) Hosni Mubarak refuses to have solid food. ( D) Hosni Mubarak is to

14、o weak to eat any food. 17 According to the news, opposition supporters are_. ( A) sympathetic about Hosni Mubaraks health ( B) impatient to wait for Hosni Mubarak to stand trial ( C) sceptical about reports on Hosni Mubaraks health ( D) worried about the hospitals skill of treating Mubarak 17 The N

15、ext Web Timothy Berners-Lee might be giving Bill Gates a run for the money, but he passed up his shot at fabulous wealth-intentionallyin 1990. Thats when he decided not to patent the technology used to create the most important software innovation in the final decade of the 20th century: the World W

16、ide Web. Berners-Lee wanted to make the world a richer place, not a mass personal wealth. So he gave his brainchild to us all. Berners-Lee regards todays Web as a rebellious adolescent that can never fulfill his original expectations. By 2005, he hopes to begin replacing it with the Semantic Weba sm

17、art network that will finally understand human languages and make computers virtually as easy to work with as other humans. As imagined by Berners-Lee, the new Web would understand not only the meaning of words and concepts but also the logical relationships among them. That has great potential. Mos

18、t knowledge is built on two pillars: semantics and mathematics. In number processing, computers already outclass people. Machines that are equally skilled at dealing with language and reason wont just help people uncover new insights: they could blaze new trails on their own. Even with a fairly crud

19、e version of this future Web, mining online for valuable pieces of knowledge would no longer force people to go through screen after screen of irrelevant data. Instead, computers would dispatch intelligent agents, or software messengers, to explore Web sites by the thousands and logically pick out j

20、ust whats relevant. That alone would provide a major boost in productivity at work and at home. But theres far more. Software agents could also take on many routine business work, such as helping manufacturers find and negotiate with lowest-cost parts suppliers and handling help-desk questions. The

21、Semantic Web would also be a treasure house of eureka insights. Most inventions and scientific breakthroughs, including todays Web, spring from novel combinations of existing knowledge. The Semantic Web would make it possible to evaluate more combinations overnight than a person could do in a lifeti

22、me. Sure scientists and other people can post ideas on the Web today for others to read. But with machines doing the reading and translating technical terms, related ideas from millions of Web pages could be distilled and summarized. That will lift the ability to assess and integrate information to

23、new heights. The Semantic Web, Berners-Lee predicts, will help more people become more intuitive as well as more analytical. It will foster global collaborations among people with diverse cultural perspectives, so we have a better chance of finding the right solutions to the really big issueslike th

24、e environment and climate warming. 18 Had he wanted, Berners-Lee could have_. ( A) created the most important innovation in the 1990s ( B) accumulated as much personal wealth as Bill Gates ( C) patented the technology of Microsoft software ( D) given his brainchild to us all 19 The Semantic Web will

25、 be superior to todays web in that it _. ( A) surpasses people in processing numbers ( B) fulfills users original expectations ( C) deals with language and reason as well as number ( D) responds like a rebellious adult 20 To search for any information needed on tomorrows Web, one only has to_. ( A)

26、go through screen after screen of irrelevant data ( B) ask the Web to dispatch some messenger to his door ( C) use smart software programs called “agents“ ( D) explore Web sites by the thousands and pick out whats relevant 21 Thanks to the Web of the future,_. ( A) millions of web pages can be trans

27、lated overnight ( B) one can find most inventions and breakthroughs online ( C) software manufacturers can lower the cost of computer parts ( D) scientists using different specialty terms can collaborate much better 22 The most appropriate title for this text is_. ( A) Differences Between Two Webs (

28、 B) The Humanization of Computer Software ( C) A New Solution to World Problems ( D) The Creator and His Next Creation 一、 PART III GENERAL KNOWLEDGE (10 MIN) Directions: There are ten multiple-choice questions in this section. Choose the best answer to each question. 23 The national anthem(s)of Cana

29、da is/are ( A) O Canada. ( B) God Save The Queen. ( C) O Canada and God Save the Queen. ( D) O Canada and the Star Spangled Banner. 24 All of the following words belong to “Broadening“ in semantic change EXCEPT _ ( A) Bird. ( B) Task. ( C) Camp. ( D) Holiday. 25 An aspirated /p/ and an unaspirated /

30、p/ are_of the p phoneme. ( A) morphemes ( B) phones ( C) tagmemes ( D) allophones 26 Which of the following works is NOT written by William Shakespeare? ( A) A Midsummer Nights Dream. ( B) The Tragedy of Macbeth. ( C) Paradise Lost. ( D) The Tempest. 27 The English Renaissance period was an age of _

31、. ( A) poetry and drama ( B) drama and novel ( C) novel and poetry ( D) romance and poetry 28 What is another name for New York? ( A) Big Ben. ( B) Big Port. ( C) Big Apple. ( D) Big Bear. 29 In Britain, popular newspapers are also called_ ( A) tabloids ( B) quality ( C) broadsheets ( D) junk 30 Can

32、ada gained final independence from Britain in ( A) 1774. ( B) 1838. ( C) 1945 ( D) 1982 31 British English is spoken in _. ( A) Great Britain ( B) Australia ( C) New Zealand ( D) A, B, and C 32 Which of the following is NOT Mark Twains works? ( A) The Innocent s Abroad ( B) The Adventures of Tom Saw

33、yer ( C) The Prince and the Pauper ( D) Daisy Miller 二、 PART IV PROOFREADING they are connected with each other and with other cities. The same ideas, or related ones, turn up in different places; the human problems that repeat themselves in life repeat themselves in literature, but with different s

34、olutions according to different writings at different times. Reading can only be fun if you expect it to be. If you concentrate on books somebody tells you “ought“ to read, you probably wont have fun. But if you put down a book you dont like and try another till you find one that means something to

35、you, and then relax with it, you will almost certainly have a good time-and if you become as a result of reading, better, wiser, or more gentle, you wont have suffered during the process. 三、 PART VI WRITING (45 MIN) Directions: Write a composition of about 400 words on the following topic. 36 Interv

36、iew is frequently used by employers as a means to recruit prospective employees. As a result, there have been many arguments for or against the interview as a selection procedure. What is your opinion? Write an essay of about 400 words to state your view. In the first part of your essay you should s

37、tate clearly your main argument, and in the second part you should support your argument with appropriate details. In the last part you should bring what you have written to a natural conclusion or make a summary. You should supply an appropriate title for your essay. Marks will be awarded for conte

38、nt, organization, grammar and appropriateness. Failure to follow the above instructions may result in a loss of marks. 专业英语八级模拟试卷 681答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the importan

39、t points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for no

40、te-taking. 0 【听力原文】 Computer Crime Good morning, todays lecture is the very first of a series of lectures on types of modern crimes, so Id like to discuss the first typecomputer crime right now. As computer crimes are getting more and more rampant, laws must be passed to address the increase in the

41、number and types of those crimes. Over the last twenty years, large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have compute

42、rs at home and at the office. So, who committed computer crimes? Whats the definition of computer crime and what forms does computer crime take on? And what are our protection measures? We shall answer the preceding questions one by one. First, what kinds of people tend to commit computer crimes? Ac

43、cording to experts, computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, although later they are becoming more aggressi

44、ve.(1)Computer Criminals tend to usually be between the ages of 14-30,(2)they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from normal

45、 individuals, but that is not the case. It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path. There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short

46、 to tall. (3) Second, we shall discuss the evolutionary definition of computer crime. Definitions of computer crime have changed over the years as the users and misusers of computers have expanded into new areas.(4)When computers were first introduced into businesses, computer crime was defined simp

47、ly as a form of white-collar crime committed inside a computer system. Congress has been reacting to the outbreak of computer crimes. The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases

48、protected by federal privacy statutes.(5)This bill is generally creating several categories of federal crimes for unauthorized access to computers to obtain money, goods or services or classified information. Third, computer crimes can take on many forms. The first form is swindling or stealing of m

49、oney is one of the most common computer crimes.(6)An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $ 21.3 million, which is the largest U.S. electronic bank fraud on record. The second form is called credit card scams.(7)This is one that fears many people for good reasons. The following story is a real case. A fellow c

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1