ImageVerifierCode 换一换
格式:DOC , 页数:15 ,大小:55KB ,
资源ID:482998      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-482998.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]大学英语四级改革适用(阅读)模拟试卷76及答案与解析.doc)为本站会员(terrorscript155)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]大学英语四级改革适用(阅读)模拟试卷76及答案与解析.doc

1、大学英语四级改革适用(阅读)模拟试卷 76及答案与解析 Section B 0 Sandy s Story A)Sandy, a polite and friendly forty-year-old woman with a soft Southern accent, loves cats and frequented the newsgroup rec. pets. cats. B)In 1993 a gang of people from several newsgroups, alt. tasteless, alt. Syntax. Tactical and alt. bigfoot,

2、“invaded“ the rec. pets. Cats. Newsgroup. By the time the invasion had ended, Sandy had received death threats, hate mails and harassing phone calls. Having her email monitored at work, she had almost lost her job. C)The incident began when one of the invaders who joined her newsgroup posted a messa

3、ge asking if he could get help destroying his girlfriend s cat. He said the cat was bothering him, but he didnt want the girlfriend to find out if he killed it. When he began discussing poison and drowning as options, Sandy spoke up. D)First she sent email urging him not to kill the cat. But if he i

4、nsisted, to have it “put to sleep“ humanely. When the email didnt help, Sandy became concerned, then terrified for the cat. She had nightmares. Eventually she wrote a letter to the police that was subsequently distributed on the Internet. E)The flame war explored. The request for help in killing the

5、 cat was actually a fake. The poster and his friends had purposefully chosen a quiet little newsgroup to start a flame war of mythic proportions. Their stated goal was to inflame the members of the group with their posts. And it worked. But when Sandy contacted the police, the invaders became ugly a

6、nd turned their attention to her. F)Soon Sandy found herself on the member list of a Net. Invaderz FAQ(Frequently Asked Questions document)that was being passed around Usenet and even several computer conventions. Rather than being a victim, Sandy was singled out as one of the victimizers. “Those of

7、 us that opposed the group coming in and invading us(were added to the list),“she said. “It was spammed all over the network as a true document with our names on it.“ G)Sandy was disturbed but tried to ignore the problems as much as possible until she found herself under investigation by her own com

8、pany. An irate “U.S. taxpayer“ had written to her employer complaining that she didnt want the Internet used for actions such as those described in the Net. Invaderz document. “Im a twenty-two year employee in this company, with a good reputation which is now in the pooper because of this,“ she said

9、. H)Sandy hasnt prosecuted but the incident exhausted her and made her fearful. She no longer participates in or even reads rec. pets. Cats.; concerned friends email her posts of interest privately. She cannot afford her own home computer, so she can only access the Internet through work, where her

10、supervisor now watches her every move. I)Because she acted(in this case alerting the authorities to what she believed to be cruelty to animals), Sandy became the target of a vicious attack launched by a group of people she has never even met. J)In part, the wars going on in cyberspace are cultural w

11、ars. Who is to decide what is polite and acceptable? Some time ago, I talked with one of the founders of alt. syntax. Tactical, who calls himself Antebi. His responses to those who suggest his tactics are uncivilized “Learn to use killfiles,“ he says. “Grow up, welcome to reality.“ K)After talking w

12、ith him, I understood his group to be somewhat like an Internet fraternity, a bunch of young men who like to do virtual “panty raids“ on unsuspecting newsgroups. The young people themselves arent the problem(I do not think alt. Syntax, tactical was responsible for the death threats to Sandy), but th

13、at kind of mischievous mentality, coupled with a lot of free time, means that certain people can abuse their power in the virtual world. L)But should the virtual world be one where war is the only metaphor? An invading army swept through Sandys village, and when she reached out to protect someone el

14、se, they turned their sights on her. She was attacked, accused, harassed and threatened with no possible resource. The army captain merely says she should have armed herself. But perhaps there are other ways to live than by the rule of the strongest? Isn t that what civilization is supposed to be ab

15、out? 1 At the beginning of the incident, one of the invaders wanted Sandy to kill his girlfriend s cat. 2 On the member list, Sandy found herself a victimizer. 3 The invasion in 1993 almost made Sandy lose her job. 4 Exhaustion and fear prevented Sandy from participating in rec. pets. cats. 5 To som

16、e degree, the wars in cyberspace are mostly related to culture. 6 The message posted was fake, whose purpose was to irritate the members of the group. 7 When Sandy trying protecting someone else, she was noticed and attacked. 8 Mischievous mentality indulges certain people with abuse of their power

17、in the virtual world. 9 When Sandy found herself under investigation by her own company, she was irritated. 10 Sandy wrote to the police when she failed to persuade him not to kill the cat. 10 Preparing for Computer Disasters Summary A)When home office computers go down, many small businesses grind

18、to a halt. Fortunately, taking steps to recover from disasters and minimizing their effects is quite straightforward. B)Fires, power surges, and floods, theyre all facts of life. We read about them in the morning paper and see them on the evening news. We sympathize with the victims and commiserate

19、over their bad luck. We also shake our heads at the digital consequencesmelted computers, system failures, destroyed data. Yet, somehow, many of us continue to live by that old mantra of denial: “It wont happen to me.“ Well, the truth is, at some point youll probably have to deal with at least one d

20、isaster. That s just how it goes, and in most aspects of our lives we do something about it. We buy insurance. We stow away provisions. We even make disaster plans and run drills. But for some reason, computer disaster recovery is a blind spot for many of us. It shouldnt be. Home computers contain s

21、ome of our most important information, both business and personal, and making certain our data survives a disaster should be a priority. Moreover, even the smallest disaster can be a serious disruption. Personal computers have become an integral part of the smooth-running household. We use them to c

22、ommunicate, shop, and do homework, and theyre even more vital to home office users. When home office computers go down, many small businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimize their effects is quite straightforward. With a good offsite storage plan and

23、 the right tools, you can bounce back quickly and easily from minor computer disasters. And, should a major calamity strike, you can rest assured your data is safe. Offsite Storage: Major Disasters C)House fires and floods are among the most devastating causes of personal computer destruction. That

24、s why a solid offsite backup and recovery plan is essential. Although many home users faithfully back up their hard drives, many would still lose all their data should their house flood our burn. That s because they keep their backups in relatively close to their computers. Their backup disks might

25、not be in the same room as their computers tucked away in a closet or even the garage but theyre not nearly far enough away should a serious disaster strike. So, it s important to back up your system to a removable medium and to store it elsewhere. D)There are many ways to approach offsite storage.

26、It starts with choice of backup tools and storage medium. Disaster situations are stressful, and your recovery tools shouldnt add to that stress. They must be dependable and intuitive, making it easy to schedule regular backups and to retrieve files in a pinch. They must also be compatible with your

27、 choice of backup medium. Depending on your tools, you can back up to a variety of durable disk types from CDs to Jaz drives to remote network servers. Although many of these storage media have high capacity, a backup tool with compression capabilities is a big plus, eliminating the inconvenience of

28、 multiple disks or large uploads. E)Once you select your tools and a suitable medium, you need to find a remote place to store your backups. The options are endless. However, no matter where you choose, be sure the site is secure, easily accessible, and a good distance away from your home. You may a

29、lso want to consider using an Internet-based backup service. More and more service providers are offering storage space on their servers, and uploading files to a remote location has become an attractive alternative to conventional offsite storage. Of course, before using one of these services, make

30、 certain you completely trust the service provider and its security methods. Whatever you do, schedule backups regularly and store them far away from your home. Come What May: Handling the Garden Variety Computer Crisis F)Not all home computer damage results from physical disaster. Many less menacin

31、g problems can also hobble your PC or destroy your information. Systems crash, kids “rearrange“ data, adults inadvertently delete files. Although these events might not seem calamitous, they can have serious implications. So, once again, it s important to be prepared. As with physical disasters, reg

32、ular backups are essential. However, some of these smaller issues require a response thats more nuanced than wholesale backup and restoration. To deal with less-than-total disaster, your tool set must be both powerful and agile. For example, when a small number of files are compromised, you may want

33、 to retrieve those files alone. Meanwhile, if just your settings are affected, youll want a simple way to roll back to your preferred setup. Yet, should your operating system fail, youll need a way to boot your computer and perform large-scale recovery. Computer crises come in all shapes and sizes,

34、and your backup and recovery tools must be flexible enough to meet each challenge. The Right Tools for the Right Job: Gearing up for Disaster G)When disaster strikes, the quality of your backup tools can make the difference between utter frustration and peace of mind. Symantec understands this and o

35、ffers a range of top quality backup and recovery solutions. Norton GoBack is the perfect tool for random system crashes, failed installations, and inadvertent deletions. With this powerful and convenient solution, its simple to retrieve overwritten files or to bring your system back to its pre-crash

36、 state. Norton Ghost is a time-tested home office solution. Equipped to handle full-scale backups, its also handy for cloning hard drives and facilitating system upgrades. A favorite choice for IT professionals, its the ideal tool for the burgeoning home office. You can buy Norton Ghost and Norton G

37、oBack separately, or get them both when you purchase Norton System Works. H)Lifes disasters, large and small, often catch us by surprise. However, with a little planning and the right tools, you can reduce those disasters to bumps in the road. So, dont wait another day. Buy a good set of disaster re

38、covery tools, set up an automatic backup schedule, and perform a dry run every now and again. Then, rest easy. 11 It s necessary for us to back up our systems to some transferable medium and to put it somewhere else. 12 Not all damage of your computer caused by physical disaster. 13 The quality of y

39、our backup tools determines whether you are frustrated or have a peaceful mind when disaster strikes. 14 For some reason, computer disaster recovery is always ignored by many of us. 15 Taking steps to recover from computer disasters can minimize bad effects. 16 House fires and floods are the most de

40、vastating causes of personal computer destruction. 17 With a good offsite storage plan and the right tools, you can bounce back quickly in minor computer disasters. 18 Preparation for computer disasters should do from time to time. 19 Backup and recovery tools must be flexible enough to deal with va

41、rious computer crises. 20 You should find a distant place to store your backups after selecting your tools and a suitable medium. 20 Why Drug Testing Is Needed A)The illicit drug trade in America has fast become a $110 billion annual business. According to the Research Triangle Institute, A North Ca

42、rolina-based research organization, drug abuse cost the U.S. economy $ 60 billion in 1983, nearly a 30 percent increase from the more than $ 47 billion estimated for 1980. B)No one seriously disputes that drug abuse in the workplace is a serious and growing problem for both public and private employ

43、ers. Increasingly, the problem continues to contribute to the high rate of employee absenteeism, rising health care costs, a high rate of accidents, and the low productivity of our work force. It has been aptly called an American tragedy. C)The possibility of protests within certain shops also exist

44、s. Job actions not for more pay but to be a free citizen at work could put some heat on certain company officials. D)Take the Los Angeles Times. Its editorial page has been among the most forceful and lucid in the nation in fighting to keep the Bill of Rights in working order. Yet, according to Dani

45、el Jussim, writing in the ACLU s Civil Liberties newsletter, The “Los Angeles Times, though its director of employee relations says there s no particular drug problem at his newspaper, recently adopted a mandatory urinalysis program to stay current with what other employers are doing.“ E)Imagine the

46、 impact in Los Angeles if Anthony Day, the civil libertarian who is editor of the Los Angeles Times editorial page, were to lead a picket line outside the paper with such signs as: JAMES OTIS, FATHER OF THE FOURTH AMENDMENT, FOUGHT BRITISH GENERAL SEARCH WARRANTS ON BEHALF OF WORKING PEOPLE NOT JUST

47、 PUBLISHERS. F)The need for alliances to preserve whats left of privacy grows greater by the day. Charles Seabrook writes of new tests that can “detect the presence of the abnormal levels of chemicals found in patients with severe depression, schizophrenia, and manic-depression . that can detect che

48、mical markers that may mean a person is at high risk of developing diabetes, arthritis, or cancer. That can screen for more than 150 genetic disease, including sickle cell anemia. and cystic fibrosis.“ G)Would an employer hire someone who is at risk of developing cancer? Should an employer have acce

49、ss to such private information? H)On a more modest level, a new test developed by Werner Baumgartner, a Los Angeles chemist, bypasses such old-time procedures as requiring the random suspect to urinate into a cup or bottle. The new test uses radiation on hair and discloses not only what drugs have been taken but when they were taken, something urinalysis can t do. I)As for coming attractions that verify the prescience of George Orwell, The Washington Post reported in mid-1984, “Researchers in academia and indus

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1