ImageVerifierCode 换一换
格式:DOC , 页数:34 ,大小:115.50KB ,
资源ID:470820      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-470820.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]专业英语八级模拟试卷95及答案与解析.doc)为本站会员(sumcourage256)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]专业英语八级模拟试卷95及答案与解析.doc

1、专业英语八级模拟试卷 95及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.

2、When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Multinational Corporations Multinational investment has【 1】 _. 【 1】 _. Establishment of a multinational co

3、rporation (MNC) was a way to generate income from diversified sources, a way to 【 2】 _ return on investment and to benefit from cheaper 【 2】 _. labour abroad. The formation of the European Economic Community (EEC) in 1958【 3】 _ the growth of MNCs. Today the 【 3】 _. large MNCs control from 50 to 200

4、subsidiaries. A favourable aspect about MNCs is that they create 【 4】 _ in foreign countries. They also contribute 【 4】 _. to innovation or【 5】 _ of new products and 【 5】 _. technology. But when innovation levels off and local technology reaches a point of sufficiency, MNCs are sometimes considered

5、to be no longer【 6】 _. 【 6】 _. 【 7】 _ MNCs must learn to interrelate their subsidiaries 【 7】 _. with the parent company, to【 8】 _ decision-making authority 【 8】 _. and to develop satisfactory methods of control and supervision. An MNC must deal with【 9】 _, different legal 【 9】 _. and tax structures,

6、 foreign currency. Other problems include how to secure continued【 10】 _ to resources, how to increase market 【 10】_. share, and how to tackle increased criticism and interference by foreign government, etc. 1 【 1】 2 【 2】 3 【 3】 4 【 4】 5 【 5】 6 【 6】 7 【 7】 8 【 8】 9 【 9】 10 【 10】 SECTION B INTERVIEW

7、Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions. Now listen to the interview

8、. 11 Mr Bristow would like to deal with the matter now because ( A) Keith comes to interrupt him. ( B) Keith has made serious mistakes. ( C) he may not have time till late. ( D) he would have to work in a factory. 12 Keiths suspicion of embezzlement is based on the fact that ( A) the Works Manager h

9、as made a mistake. ( B) Holder and Bragg has acted dishonestly. ( C) the Purchasing Manager has made a mistake. ( D) more spare parts than needed have been used. 13 _ , Mr Cross wouldnt have been suspected of embezzlement. ( A) If he hadnt been on sick leave ( B) If he hadnt continued making excessi

10、ve orders ( C) If he hadnt been Mr Lawtons brother-in-law ( D) If he hadnt been spotted by Mr Lawton 14 Mr Bristow suspects that _. ( A) Cross and Lawton have colluded in the swindle. ( B) Keith does not possess any evidence. ( C) Cross is purposely on sick leave. ( D) Keith is telling a lie. 15 Whi

11、ch of the following statements is CORRECT? ( A) Cross may be severely punished. ( B) Cross illness justifies his misconduct. ( C) Cross and Lawton work part-time for Holder and Bragg. ( D) Cross and Hammond have conspired against Mr Bristow. SECTION C NEWS BROADCAST Directions: In this section you w

12、ill hear everything ONCE ONLY. Listen carefully and then answer the questions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 The dismantled heroin trafficking network is characterized by ( A) its being multinational. ( B) its simultaneous operatio

13、n. ( C) its major role of heroin supplier. ( D) its major role of cocaine supplier. 17 The Russias request for two computers was refused because the United States wanted to prevent their use in ( A) US Customs Service. ( B) Russias nuclear programme. ( C) US Department of Commerce. ( D) Russias non-

14、military labs. 18 The key issue in the reported investigation is ( A) whether similar cases could have occurred. ( B) how the computers could have been sold to Russia. ( C) why Moscow offers to move them to new locations. ( D) if they are being used in Russias nuclear programme. 19 Participants in t

15、he conference differ greatly in their opinion about _ to achieve the effective elimination of child labour. ( A) how ( B) when ( C) why ( D) where 20 Some development experts feel that _. ( A) the conference may conclude with a consensus on the problem. ( B) it will be relatively easier to solve the

16、 problem after the conference. ( C) thousands of child workers in India may die of poor work condition. ( D) the current approach to child labour problems could worsen matters. 20 1 Researchers uncovered a serious flaw in the underlying technology for nearly all Internet traffic, a discovery that le

17、d to an urgent and secretive international effort to prevent global disruptions of Web surfing, e-mails and instant messages. 2 The British government announced the vulnerability in core Internet technology on Tuesday. Left unaddressed, experts said, it could allow hackers to knock computers offline

18、 and broadly disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers. 3 “Exploitation of this vulnerability could have affected the glue that holds the Internet together,“ said Roger Cumming, director for Englands National Infrastru

19、cture Security Coordination Centre. 4 The Homeland Security Department issued its own cyberalert hours later that attacks “could affect a large segment of the Internet community.“ It said normal Internet operations probably would resume after such attacks stopped. Experts said there were no reports

20、of attacks using this technique. 5 The risk was similar to Internet users “running naked through the jungle, which didnt matter until somebody released some tigers,“ said Paul Vixie of the Internet Systems Consortium Inc. 6 “Its a significant risk,“ Vixie said. “The larger Internet providers are jum

21、ping on this big time. Its really important this just gets fixed before the bad guys start exploiting it for fun and recognition.“ 7 The flaw affecting the Internets “transmission control protocol,“ or TCP, was discovered late last year by a computer researcher in Milwaukee. Paul Watson said he iden

22、tified a method to reliably trick personal computers and routers into shutting down electronic conversations by resetting the machines remotely. 8 Routers continually exchange important updates about the most efficient traffic routes between large networks. Continued successful attacks against route

23、rs can cause them to go into a standby mode, known as “dampening,“ that can persist for hours. 9 Experts previously said such attacks could take between four years and 142 years to succeed because they require guessing a rotating number from roughly 4 billion possible combinations. Watson said he ca

24、n guess the proper number with as few as four attempts, which can be accomplished within seconds. 10 Cisco Systems Inc., which acknowledged its popular routers were among those vulnerable, distributed software repairs and tips to otherwise protect large corporate customers. There were few steps for

25、home users to take; Microsoft Corp. said it did not believe Windows users were too vulnerable and made no immediate plans to update its software. 11 Using Watsons technique to attack a computer running Windows “would not be something that would be easy to do,“ said Steve Lipner, Microsofts director

26、for security engineering strategy. 12 Already in recent weeks, some U. S. government agencies and companies operating the most important digital pipelines have fortified their own vulnerable systems because of early warnings communicated by some security organizations. The White House has expressed

27、concerns especially about risks to crucial Internet routers because attacks against them could profoundly disrupt online traffic. 13 “Any flaw to a fundamental protocol would raise significant concern and require significant attention by the folks who run the major infrastructures of the Internet,“

28、said Amit Yoran, the governments cyber security chief. The flaw has dominated discussions since last week among experts in security circles. 14 The public announcement coincides with a presentation Watson expects to make Thursday at an Internet security conference in Vancouver, British Columbia, whe

29、re Watson said he would disclose full details of his research. Watson predicted that hackers would understand how to begin launching attacks “within five minutes of walking out of that meeting.“ 21 Which of the following is NOT true? ( A) Serious flaw uncovered in a core Internet technology had attr

30、acted international attention. ( B) The Internet is held together by the glue. ( C) Normal Internet operations may survive the hacker attacks. ( D) Hackers could attack computers without getting online. 22 “Somebody“ in “somebody released some tigers“ in Para. 5 refers specifically to _. ( A) Intern

31、et providers ( B) Internet users ( C) routers ( D) hackers 23 At the end of the article, the author seems to suggest _. ( A) there is no solution to the flaw in the Internet technology ( B) there is much worry within the academic circle about Internet security ( C) US government is indifferent to th

32、e hacker attacks ( D) Internet traffic is easily vulnerable to hack attacks 23 1 For the Greeks, beauty was a virtue: a kind of excellence. Persons then were assumed to be what we now have to calllamely, enviouslywhole persons. If it did occur to the Greeks to distinguish between a persons “inside“

33、and “outside,“ they still expected that inner beauty would be matched by beauty of the other kind. The well-born young Athenians who gathered around Socrates found it quite paradoxical that their hero was so intelligent, so brave, so honorable, so seductiveand so ugly. One of Socrates main pedagogic

34、al acts was to be uglyand teach those innocent, no doubt splendid-looking disciples of his how full of paradoxes life really was. 2 They may have resisted Socrates lesson. We do not. Several thousand years later, we are more wary of the enchantments of beauty. We not only split offwith the greatest

35、facilitythe “inside“(character, intellect) from the “outside“ (looks); but we are actually surprised when someone who is beautiful is also intelligent, talented, good. 3 It was principally the influence of Christianity that deprived beauty of the central place it had in classical ideals of human exc

36、ellence. By limiting excellence (virtus in Latin) to moral virtue only, Christianity set beauty adriftas an alienated, arbitrary, superficial enchantment. And beauty has continued to lose prestige. For close to two centuries it has become a convention to attribute beauty to only one of the two sexes

37、, the sex which, however fair, is always Second. Associating beauty with women has put beauty even further on the defensive, morally. 4 A beautiful woman, we say in English, but a handsome man. “Handsome“ is the masculine equivalent ofand refusal ofa compliment which has accumulated certain demeanin

38、g overtones, by being reserved for women only. That one can call a man “beautiful“ in French and in Italian suggests that Catholic countriesunlike those countries shaped by the Protestant version of Christianitystill retain some vestiges of the pagan admiration for beauty. But the difference, if one

39、 exists, is of degree only. In every modern country that is Christian or post-Christian, women are the beautiful sexto the detriment of the notion of beauty as well as of women. 24 The author means _ by “whole persons“ in Para. ( A) persons of beauty ( B) persons of virtue ( C) persons of excellence

40、 ( D) none of the above 25 Why does the author speculate that Socrates disciples may have resisted his lessons? ( A) Because Socrates was ugly. ( B) Because Socrates taught them to be critical. ( C) Because they had a different expectation. ( D) Because they were innocent. 26 The author does not thi

41、nk of it as a(n) _ to call women the beautiful sex. ( A) compliment ( B) insult ( C) abuse ( D) humiliation 27 Which of the following is NOT true according to the passage? ( A) Christianity draws a distinction between beauty and excellence. ( B) People has lost their admiration for beauty throughout

42、 Christian society. ( C) Handsome is the equivalent of “beautiful“ in meaning. ( D) Women are thought to be inferior. 27 1 We often hear people ask such a question: Why do bad things happen to good people? The problem is. What kind of people are good? Some people make a distinction between two kinds

43、 of “good“ people. One kind of “good“ refers to innocence, as in a 2-year-old child who dies in an accident and who never intentionally hurt anyone. Another kind of “good“ refers to people who have lived long lives of humility or service, like Martin Luther King, Jr. To really answer this question,

44、though, we have to challenge our assumptions. Why do we assume that people always get what they deserve? What if being “good“ was dependent on a lot of bad things happening to you? 2 Looking at being “good“ as increasing strength of self, it would take trials and tribulations to increase our appreci

45、ation of what we have. Losing my life savings in an identity theft ring definitely wouldnt be a good thing, but the subsequent realization that I need to focus less on material things and more on my emotional, social and spiritual being would be priceless. Suffering can be a blessing. 3 In fact, not

46、 only is such stress necessary for increasing strength, but if bad things dont happen to good people, then perhaps they would lose those inner qualities that identify them as “good.“ 4 When we think of “good“ people, we often imagine them with some sort of amazing intrinsic motivation, such as utter

47、 humility or divine inspiration. But perhaps its not that these “good“ people have such a high intrinsic motivation, but rather that others motivation is shifted to more extrinsic factors. 5 Social psychologists call this shift the overjustification effect. Theyve found in various experiments that p

48、eople who first started a task with inner motivation could lose that drive when given external rewards. For instance, lets say some students really like to study and end up doing well in school. Half of those students are then given money as a reward for their good grades. Eventually, those students will tend to get good grades for the money and not for their original passion. In fact, the paid students performance will decrease if you take away any money. 6 This brings us back to why bad things happen to good people. If good things happ

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1