ImageVerifierCode 换一换
格式:DOC , 页数:36 ,大小:226.50KB ,
资源ID:477254      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-477254.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]国家公共英语(四级)笔试模拟试卷245及答案与解析.doc)为本站会员(orderah291)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]国家公共英语(四级)笔试模拟试卷245及答案与解析.doc

1、国家公共英语(四级)笔试模拟试卷 245及答案与解析 PART A Directions: For Questions 1-5, you will hear a conversation. While you listen, fill out the table with the information you have heard. Some of the information has been given to you in the table. Write only 1 word in each numbered box. You will hear the recording twi

2、ce. You now have 25 seconds to read the table below. 1 PART B Directions: For Questions 6-10, you will hear a passage. Use not more than 3 words for each answer. You will hear the recording twice. You now have 25 seconds to read the sentences and the questions below. 6 PART C Directions: You will he

3、ar three dialogues or monologues. Before listening to each one, you will have 5 seconds to read each of the questions which accompany it. While listening, answer each question by choosing A, B, C or D. After listening, you will have 10 seconds to check your answer to each question. You will hear eac

4、h piece ONLY ONCE. 11 According to the woman, how much money should people save for themselves? ( A) 36 months of monthly salary ( B) 13% of salary ( C) $10 ( D) Not mentioned 12 Whats the biggest mistake people make? ( A) They do not think $ 10 is a large sum of money. ( B) They sacrifice movie, be

5、er for bank deposit. ( C) They seldom have fixed deposit. ( D) They tend to live from paycheck to paycheck. 13 What does “Pay yourself first“ refer to? ( A) Take more education and make yourself promoted quickly. ( B) When you get your paycheck, save some portion of it. ( C) Lend money from bank whe

6、n you want to prepare for the future. ( D) Accumulate money by all means. 14 What is Freuds contributions to psychology? ( A) Human personality ( B) His conscious theory ( C) His free will ( D) Personality theory 15 What did Freud think about one of his patients remarks “Ill pay you later, Dr. Freud

7、. “? ( A) He was joking with Freud. ( B) He played in Freuds office. ( C) He unconsciously revealed his intention of refusing to pay. ( D) He only made his empty promise to Freud. 16 What was Freud primarily interested in? ( A) Money ( B) Jewish independence ( C) University setting ( D) Theory 17 Me

8、gan Delia Selva, who has already traded e-mail messages with her mom, just to say hi, is a_. ( A) freshman ( B) sophomore ( C) junior ( D) senior 18 What is the relationship between Maria Minkarah and Megan Delia Selva? _ ( A) Teacher and student. ( B) Sisters. ( C) Good friends. ( D) Mother and dau

9、ghter. 19 According to the report, what is the most striking thing?_ ( A) The tone students had when talking about their parents: fond, warm and admiring. ( B) The young women keep in close touch with their families, discussing matters big and small, academic and personal. ( C) Many students turn to

10、 their parents for help with everything from roommate troubles to how to improve the paper they e-mailed home. ( D) Not all college students are closely connected with their parents. 20 Which has a lot to do with what university administrators and parents alike say has been a big change over the las

11、t decade, besides cellphones? _ ( A) Web access. ( B) Stronger presence of parents on campus. ( C) Offices created to deal with parents queries and concerns. ( D) E-mail. 一、 Section II Use of English (15 minutes) Directions: Read the following text. Choose the best word for each numbered blank and m

12、ark A, B, C or D on ANSWER SHEET 1. 20 Everyone knows that taxation is necessary in a modern state: 21 it, it would not be possible to pay the soldiers and policemen who protect us; 22 the workers in government offices who 23 our health, our food, our water, and all 24 things that we can not do for

13、ourselves. By 25 of taxation, we pay for things that we need as 26 as we need somewhere to live and something to eat. In most countries, a direct tax on persons, 27 is called income tax, exists. It is arranged in such a way that the poorest people pay 28 , and the percentage of tax grows greater as

14、the taxpayers 29 grows. In England, for example, the tax on the 30 people goes up as high as ninety-five percent! But countries with direct taxation nearly always have 31 taxation too. Many things imported into the country have to pay taxes or “duties“. 32 , it is the men and women who buy the impor

15、ted things in the shops who really 33 pay the duties, in the 34 of higher prices. In some countries, too, there is a tax 35 things sold in the shops. If the most necessaary things are taxed, a lot of money is collected, but the poor people suffer 36 . If unnecessary things like jewels and fur coats

16、are taxed, 37 is obtained,but the tax is fairer, as the 38 pay it. Probably this last kind of indirect tax, 39 with a direct on incomes which is low for the poor and high for the rich, is 40 arrangement. ( A) because of ( B) instead of ( C) with ( D) without ( A) so ( B) nor ( C) not ( D) all ( A) l

17、ook after ( B) sympathize ( C) consider ( D) see ( A) other ( B) others ( C) the other ( D) many ( A) mean ( B) means ( C) a means ( D) the means ( A) many ( B) well ( C) more ( D) much ( A) which ( B) what ( C) that ( D) it ( A) a lot ( B) most ( C) nothing ( D) more ( A) income ( B) population ( C

18、) tax ( D) amount ( A) poor ( B) working ( C) rich ( D) richest ( A) no ( B) income ( C) indirect ( D) direct ( A) However ( B) So ( C) Of course ( D) By chance ( A) have to ( B) will ( C) are willing to ( D) should ( A) way ( B) form ( C) name ( D) terms ( A) about ( B) on ( C) for ( D) form ( A) l

19、east ( B) highly ( C) less ( D) most ( A) less money ( B) more money ( C) fewer money ( D) most money ( A) people ( B) poor ( C) rich ( D) country ( A) including ( B) along ( C) dealing ( D) and ( A) the best ( B) the worst ( C) good ( D) better Part B Directions: Read the following four texts. Answ

20、er the questions below each text by choosing A, B, C or D . Mark your answers on ANSWER SHEET 1. 40 The history of English is conventionally, if perhaps too neatly, divided into three periods usually called Old (or Anglo-Saxon)English, Middle English, and Modern English. The earliest period begins w

21、ith the migration of certain Germanic tribes from the continent to Britain in the fifth century A. D, though no records of their language survive from before the seventh century, and it continues until the end of the seventh century or a bit later. By that time, Latin, Old Norse (the language of the

22、 Viking invaders), and especially the Anglo-Norman French of the dominant class after the Norman Conquest in 1066 had begun to have a substantial impact on the vocabulary, and the well-developed inflectional (词尾变化的 ) system that typifies the grammar of Old English had begun to break down. The period

23、 of Middle English extends roughly from the twelfth century through the fifteenth. The influence of French (and Latin, often by way of French) upon the vocabulary continued throughout the period, the loss of some inflections and the reduction of others accelerated, and many changes took place within

24、 the grammatical systems of the language. A bypical prose passage, specially one from the later part of the period, will not have such a foreign look to us as the prose of Old English, but it will not be mistaken for contemporary writing either. The period of Modern English extends from the sixteent

25、h century to our own day. The early part of this period saw the completion of a revolution in vowel distribution that had begun in late Middle English and that effectively brought the language to something resembling its present pattern. Other important early developments include the stabilizing eff

26、ect on spelling of the printing press and the beginning of the direct influence of Latin, and to a lesser extent, Greek on the vocabulary. Later, as English came into contact with other cultures around the world and distinctive dialects of English developed in the many areas which Britain had coloni

27、zed, numerous other languages made small but interesting contributions to our word-stock. 41 The earliest written record of English available to us started ( A) from the seventh century ( B) from the fifth century ( C) from the twelfth century ( D) from the ninth century 42 What is the main feature

28、of the grammar of Old English? ( A) The influence of Latin. ( B) A revolution in vowel distribution. ( C) A well-developed inflectional system. ( D) Loss of some inflections. 43 what can be inferred from the passage? ( A) Even an educated person can not read old English without special training. ( B

29、) A person who knows French well can understand old English. ( C) An educated person can understand old English but can not pronounce it. ( D) A person can pronounce old English words but cant understand them. 44 Which of the following is NOT mentioned? ( A) French. ( B) Latin. ( C) Greek. ( D) Germ

30、an. 45 What is the most remarkable characteristic of Modern English? ( A) Numerous additions to its vocabulary. ( B) Completion of a revolution in vowel distribution. ( C) Gradual changes in its grammatical system. ( D) The direct influence of Latin. 45 The first big-name hackers include Steve Wozni

31、ak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then,

32、 the word “hacker“ didnt have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead. The objectives of early hackers are a far cry from the goals of todays hackers. The motivation of the new breed of hackers a

33、ppears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of todays hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet. The rate of security att

34、acks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about; Operating systems and applications will never be secure. New vulnerabilities will be introduced

35、into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesnt matter how much you tra

36、in and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on t

37、op of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client

38、. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor se

39、rvices Use intrusion detection systems, vulnerability scans, anti-virus protection. 46 Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE? ( A) They are all good examples of todays computer users. ( B) They are driven by greed, power, revenge, or some other mal

40、icious intent. ( C) Their goal is to push programs beyond what they are designed to do. ( D) They are all dead. 47 The underlined word “hacker“ (Para. 1) most probably means “_“. ( A) highly recognisable names behind many of the computer technologies used today ( B) the negative connotation of those

41、 computer users ( C) a game, employing the tools that are readily available via the Internet ( D) People who break into computer systems 48 Which of the following is NOT true of security attacks? ( A) Employees will keep up with security polices and awareness if they are highly-trained. ( B) The rat

42、e of security attacks appears faster than the growth of the Internet. ( C) Ones computer system will never be secure. ( D) Vulnerabilities can go through phones, wireless devices, and network appliances. 49 What is the most important one among the realities listed? ( A) New vulnerabilities will be i

43、ntroduced into your environment every day. ( B) If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly configuring firewalls and intrusion detection systems for their PCs. ( C) Managers have more responsibility than

44、 ever. ( D) Security managers are asked to support increasing degrees of network availability and access. 50 Various security measures are recommended EXCEPT_. ( A) turning off network services ( B) employing a full-inspection firewall ( C) making sure that servers and applications are patched ( D)

45、eliminating all unneeded programs 50 The question of whether war is inevitable is one, which has concerned many of the worlds great writers. Before considering this question, it will be useful to introduce some related concepts. Conflict, defined as opposition among social entities directed against

46、one another, is distinguished from competition, defined as opposition among social entities independently striving for something, which is in inadequate supply. Competitors may not be a-ware of one another, while the parties to a conflict are. Conflict and competition are both categories of oppositi

47、on, which has been defined as a process by which social entities function is the disservice of one another. Opposition is thus contrasted with cooperation, the process by which social entities function in the service of one another. These definitions are necessary because it is important to emphasiz

48、e that competition between individuals or groups is inevitable in a world of limited resources, but conflict is not. Conflict, nevertheless, is very likely to occur, and is probably an essential and desirable element of human societies. Many authors have argued for the inevitability of war from the

49、premise that in the strug-gle for existence among animal species, only the fittest survive. In general, however, this struggle in nature is competition, not conflict. Social animals, such as monkeys and cattle, fight to win or maintain leadership of the group. The struggle for existence occurs not in such fights, but in the competition for limited feeding areas and for occupancy of areas free from meat-eating animals. Those who fail in this competition starve to death or become victims to other species. This struggle for existence does n

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1