ImageVerifierCode 换一换
格式:DOC , 页数:16 ,大小:62KB ,
资源ID:471856      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-471856.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc)为本站会员(roleaisle130)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc

1、专业英语八级(科技类听力填空)模拟试卷 1及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-l

2、ecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Internet Privacy With the rapid development of e-commerce, companies are now capable of cultivatin

3、g more (1)_relationships with their customers. It empowers companies to better understand their customerswants and hence they are able to (2)_offerings to the unique needs of individuals. At the same time, this has become a (3)_because the technology involves the extensive collection and use of pers

4、onal data. The use of the cookie technology can help a website assign each individual user a unique identifier, so that he may be recognized in(4)_visits to the site. On each return visit, the site can call up user-specific information, including the consumers (5)_as indicated by documents the consu

5、mer accessed in prior visits. Despite concerns about privacy and security with online shoppers, according to the 1999 survey, still 61% of the subjects surveyed said they were (6)_toward banner ads based on their personal interests rather than random ones. The study seems to (7)_ the e-commerce firm

6、s who are willing to provide customized shopping experiences. Statistics also show that not all the websites post privacy policies. Furthermore, the exact definition of the privacy policies in themselves remains (8)_. Finally, in spite of privacy (9)_, some companies, e.g. AdA still offended custome

7、rs by transferring users information data to another company. To sum up, the (10)_of effective privacy protection is widely believed to be stunting the growth of e-commerce. 10 Blog Culture The topic today is about the newly appearing phenomenon of (1)_. The most significant revolutions of the last

8、twenty years have had something to do with writing: email, webpages, blogs, etc. All this reflects a trend that communication has shifted towards words on a screen. Firstly, what is a blog? Generally speaking, its an online journal comprised of links and postings in reverse chronological order. Blog

9、s cover (2)_topics: commentaries, personal musings, political tracts, updated information, etc. However, a significant number of prominent bloggers have not enabled the comment feature. The most common(3)_of blogs tends to be its voice: blogs are written human passion. There are eight prominent feat

10、ures of bloggers: willingness to share their thoughts and experiences with others; helping each other a lot; global, reading international sources and wanting to meet other people; using (4)_; getting so much used to providing feedback themselves; showing a need for (5)_; investing so much time in t

11、heir blogs; representing the culture of speed. investing so much time in their blogs; representing the culture of speed. Finally, the (6)_of personal blogs is discussed, and the advantages as well as disadvantages to the society will be mentioned. The advantages of blogs include: sharing knowledge a

12、nd information with others; being a positive way of (7)_; showing talents and expertise of the writer; better informing the society and authorities concerned. The disadvantages of blogs are: most people dont have (8)_, or are unable to write in a compelling manner; real expertise laying hidden, and

13、readers can only get (9)_information; easy to start and hard to maintain; they are used as powerful weapons to attack others, and our legal system may be (10)_. 20 Parakey:Sharing Online Becomes Ever Easier Today a recipe isnt passed on at the Thanksgiving table anymore. Its communicated through the

14、 Internet. But grandparents are often too intimidated to do so because sharing online now involves too many steps. Its not just grandparents who arent using the Web as much as they could its everyone. The (1)_is theres no simple, cohesive tool to help people store and share their creations online. C

15、urrently, the mess of the Web leaves us (2) in one big tangle of actions, service-providers, and applications. Our answer is Parakey, which can make it easier for everyone to get their stuff online. It is “a Web (3)_system that can do everything an operating system can do.“ With Parakey, in a typica

16、l “family portal“ , mom has a page with her recipes displayed, dad has his collection of war (4)_, and the kids have their party photos. With digital photos, all you have to do is to plug in your camera, and your photos get (5)_on your computer in such a way that you can view them quickly and easily

17、 through your Parakey site. No more digging through folders for the right image files. Parakey not only (6) and displays your photos attractively but also allows for serious (7)_functions and fun scrapbooking habits! Now lets say you want to share your collection of graduation photos with some selec

18、ted family and friends. They dont have to (8)_before seeing your photo album. You just send them a digital “key“ , which contains a password, and they (9)_the stuff. Drag keys of different colors to different collections, and you open them up to different groups of people. To use Parakey, you first

19、must download a small application, with which to manage your content. Then everything is ultimately stored locally, your computer being (10)_with remote servers whenever you are online. 专业英语八级(科技类听力填空)模拟试卷 1答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You wi

20、ll hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to com

21、plete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 【听力原文】 Internet Privacy Good morning. Todays lecture still focuses on the e-commerce. One of the most important advances in the rapidly developing world of electronic commerce is the ability of companies to develo

22、p personalized relationships with their customers. Personalization empowers companies to better understand their customers wants and desires and improve customer service by tailoring offerings to the unique needs of individuals. At the same time, this has become a subject of hot controversy because

23、the technology involves the extensive collection and use of personal data. Many, if not most, online shoppers and surfers are not aware of the extent of how much and what kind of information can be gathered about a person, even someone who is just visiting and not shopping or signing up for anything

24、. Through the use of the cookie technology, a persons movement through the Web can be tracked to provide information. Using cookies a website assigns each individual a unique identifier, so that he may be recognized in subsequent visits to the site. On each return visit, the site can call up user-sp

25、ecific information, which could include the consumers preferences or interests, as indicated by documents the consumer accessed in prior visits or items the consumer clicke while in the site. Websites can also collect information about consumers through hidden electronic navigational software that c

26、aptures information about site visits, including web pages visited and information downloaded, the types of browser used, and the referring websites Internet addresses. The result is that a website about Janes gardening could sell not only her name to mail-order companies, but also the fact that she

27、 spent a lot of time one Saturday night last month reading about how to fertilize roses. More disturbing scenarios along the same lines could be imagined. However, although concern about privacy and security has long been the biggest issue with online shoppers, some of them may not mind their behavi

28、our being watched if it allows their shopping experience to be customized. According to the 1999 Personalized Marketing and Privacy on the Net: What Consumers Want survey conducted by the non-profit research firm Privacy and American Business, 61 percent of the 474 Internet users surveyed said that

29、they would be positive toward receiving banner ads tailored to their personal interests rather than receiving random ads. This represents about 56 million adult users interested in such personalization. In addition, 68 percent of the users also said that they would provide personal information in or

30、der to receive tailored banner ads, on the condition that notice and opt-out are provided. The study seems to back the e-commerce firms who are watching online behaviour to provide customized shopping experiences, and not privacy advocates who say that this practice is an invasion of privacy. It is

31、the purpose for gathering the information, it would seem, that is the key to drawing the line between acceptable personalization and invasion of privacy. This is why it is important to many shoppers that a site has a privacy policy that explains what information is gathered and how it is being used,

32、 before they relinquish their information. However, according to the 1999 Georgetown Internet Privacy Policy Survey, 94% of the top 100 websites post privacy policies, and 66% of the overall websites post privacy policies. These figures sound reassuring but the exact definition of the privacy polici

33、es in themselves remains to be questioned. The 1998 Federal Trade Commission report on Internet privacy, Privacy Online: A Report to Congress outlined five criteria by which a commercial website can be said to have a truly comprehensive privacy policy. Known as the Fair Information Practice Principl

34、es, they are notice/awareness, choice/consent, access/participation, integrity/security, and enforcement/redress. In other words, websites should notify consumers that theyre collecting personal information and that the consumers can choose whether to provide it. The result of a three-year study of

35、1,400 websites showed only 924 of the 1,400 websites surveyed were found to have privacy policies. 87 percent of these notified customers that they collect information, and 77 percent offered customers refusal rights. However, only 40 percent gave customers access to their information; 46 percent pr

36、omised security; and 49 percent provided contact information. There is also the question of how much these privacy promises are enforced. In June 1998, AdA had transferred user information including log-on names and passwords to the G, an unrelated site. Registered AdA users had no idea that the sit

37、e had done so until they received an e-mail note that welcomed them to the G and contained their AdA passwords. This incident provoked outrage from some AdAge. com users and embarrassed both companies. Although AdA later apologized to its users, explaining that the data transfer was part of a commun

38、ity partnership between the sites and was designd to allow AdA users easy access to the Gs community features, this is a glaring example of what can happen despite privacy promises. To sum up, todays lecture mainly deals with the lack of effective privacy protection which is widely believed to be st

39、unting the growth of e-commerce. Survey after survey has shown that more people would embrace e-commerce if they had better assurances about their privacy. Big businesses and small businesses have to realize that trust is necessary to build long-term, profitable customer relationships. Trust fosters

40、 customer loyalty, referrals and repeat business, so commercial enterprises that make privacy protection a priority will reap the returns from their customers. 【知识模块】 科技类 1 【正确答案】 personalized individualized 【试题解析】 本题为要点题,讲座中提到 One of the most important advances in the rapidly developing world of el

41、ectronic commerce is the ability ofcompanies to develop personalized relationships with their customers,即通过互联网,企业与客户之间建立起了更为个人化、私人化的联系。 【知识模块】 科技类 2 【正确答案】 tailor 【试题解析】 本题为细节题,讲座中提到 improve customer service by tailoring offerings to the unique needs of individuals。 【知识模块】 科技类 3 【正确答案】 hot controver

42、sial subject 【试题解析】 本题为归纳总结题,原文是 become a subject of hot controversy because 这里需要考生根据题意要求做适当修改,压缩到三个词,使之在语法语义上都切合上下文。 【知识模块】 科技类 4 【正确答案】 subsequent next later 【试题解析】 本题为推理题,讲座中提到 cookie技术能帮助记忆网民的个人用户信息,并使该用户接下来访问同一网站时能够立刻被识别出来,也可通过推理,因为 cookie本身就具备记忆功能,所以就可以跟踪网民经常访问的网站。 【知识模块】 科技类 5 【 正确答案】 prefere

43、nces interests likes 【试题解析】 本题为细节题,讲座中提到所谓用户个人信息。即用户的兴趣爱好等个人喜好。 【知识模块】 科技类 6 【正确答案】 positive 【试题解析】 本题为归纳总结题,讲座中列举了一系列的问卷调查, 1999年的调查指出虽然网民们越来越关注网络隐私安全问题,但仍有 6l的网民认为与那些随意散布的广告相比他们更愿意接收个人化的网络广告,这就说明他们的态度是正面的。 【知识模块】 科技类 7 【正确答案】 back support 【试题解析】 本题为细节题,讲座中提到 1999年的这项调查显然支持电子商务公司收集客户信息并提供相应的用户化商务服务

44、。 【知识模块】 科技类 8 【正确答案】 to be questioned questionable doubtful uncertain 【试题解析】 本题为细节题,讲座中同时指出 These figures sound reassuring but the exact definition of the privacy policies in themselves remains to be questioned虽然网络隐私安全问题日益成为大家关注的问题,但并非所有网址都提供隐私保护条例,而且对隐私政策的定义依然是模糊不清的、有争议的。 【知识模块】 科技类 9 【正确答案】 promi

45、ses 【试题解析】 本题为细节题,讲座中提到 AdAge com公司把自己的客户私人信息转让给 Globe com公司,侵犯了客户的隐私权,引起轩然大波,说明原来的隐私保护承诺并未真正被信守。 【知识模块】 科技类 10 【正确答案】 lack shortage 【试题解析】 本题为要点题,讲座中最后提到缺少有效的隐私保护,这是现存的电子商务发展的最大的绊脚石。 【知识模块】 科技类 10 【听力原文】 Blog Culture Good morning, today Id like to discuss with you the phenomenon of blog. Isnt it in

46、teresting that some of the most significant “revolutions“ of the last twenty years have all had to do with writing? First we had email, then webpages, then mobile phone texting, and now blogs. All this reflects a trend that the world is becoming more formal in how it communicates. Instead of body la

47、nguage and endless conversations, communication has shifted towards endless words on a screen. Firstly, what is a blog, anyway? Generally speaking, its an online journal comprised of links and postings in reverse chronological order, meaning the most recent posting appears at the top of the page. Bl

48、ogs run the gamut of topics. One may be a running commentary on current events in a specific arena, a series of personal musings, a purely political tract, pointers to other peoples work or products, or it may be a constantly updated “whats new“ by a domain expert. While some blogging software permits readers to post their own comments, this feature has to be turned on by the blogger, and a significant number of prominent bloggers have not enabled the comment feature. What the best individual blogs tend to have in common is voice they are cle

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1