ImageVerifierCode 换一换
格式:DOC , 页数:17 ,大小:77KB ,
资源ID:857044      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-857044.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]2015年6月大学英语六级真题试卷(三)(无答案).doc)为本站会员(ownview251)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]2015年6月大学英语六级真题试卷(三)(无答案).doc

1、2015 年 6 月大学英语六级真题试卷(三)(无答案)一、Part I Writing1 For this part, you are allowed 30 minutes to write an essay commenting on the saying “If you cannot do great things, do small things in a great way. “ You can cite examples to illustrate your point of view. You should write at least 150 words but no more

2、 than 200 words.Section A(A)Why his phone had been disconnected.(B) Why she could not get through to him.(C) Why he didnt leave her a message.(D)Why he refused to answer her call.(A)The houses within his price range are sold out.(B) Most people in this city want to own a home.(C) He has difficulty f

3、inding affordable housing.(D)The woman should rent a nicer apartment.(A)The woman would like the man to take care of her mail.(B) The woman has put the number into everyones mailbox.(C) The new copy machine can meet everyones needs.(D)A code number is necessary to run the copy machine.(A)He will sto

4、p work to take care of the baby.(B) He will find a job near his home next year.(C) His wife is going to give birth to a baby.(D)His wife will leave her work soon.(A)The shopping center is flooded with people.(B) They will come to the mall some other day.(C) Parking in this city is a horrible nightma

5、re.(D)She will wait for the man at the south gate.(A)He will be back in a minute to repair the computers.(B) It will take longer to reconnect the computers to the Net.(C) He has tackled more complicated problems than this.(D)A lot of cool stuff will be available online tomorrow.(A)She forgot to call

6、 her mother.(B) Prof. Smith gives lectures regularly on TV.(C) Her mother is a friend of Prof. Smiths.(D)She did see Prof. Smith on TV.(A)The man has to wait to get his medicine.(B) The store doesnt have the prescribed medicine.(C) The man has to go to see his doctor again.(D)The prescription is not

7、 written clearly enough.(A)It is advertising electronic products.(B) It is planning to tour East Asia.(C) It is sponsoring a TV programme.(D)It is giving performances in town.(A)A lot of good publicity.(B) Talented artists to work for it.(C) Long-term investments.(D)A decrease in production costs.(A

8、)Promise long-term cooperation with the Company.(B) Explain frankly their own current financial situation.(C) Pay for the printing of the performance programme.(D)Bear the cost of the publicising the Companys performance.(A)He has been seeing doctors and counsellors.(B) He has found a new way to tra

9、in his voice.(C) He was caught abusing drugs.(D)He might give up concert tours.(A)Singers may become addicted to it.(B) It helps singers warm themselves up.(C) Singers use it to stay away from colds.(D)It can do harm to singers vocal chords.(A)They are eager to become famous.(B) Many lack profession

10、al training.(C) Few will become successful.(D)They live a glamorous life.(A)Harm to singers done by smoky atmospheres.(B) Side effects of some common drugs.(C) Voice problems among pop singers.(D)Hardships experienced by many young singers.Section B(A)It has not been very successful.(B) It has long

11、become a new trend.(C) It has met with strong resistance.(D)It has attracted a lot of users.(A)It saves time.(B) It increases parking capacity.(C) It ensures drivers safety.(D)It reduces car damage.(A)Collect money and help new users.(B) Maintain the automated system.(C) Stay alert to any emergency.

12、(D)Walk around and guard against car theft.(A)They will vary with the size of vehicles.(B) They will be discountable to regular customers.(C) They will be lower than conventional parking.(D)They will be reduced if paid in cash.(A)Half of the methane in the atmosphere is from animals.(B) Methane has

13、become the chief source of greenhouse gas.(C) Consumer behavior may be influenced by the environment.(D)Meat consumption has an adverse effect on the environment.(A)It takes time for the human body to get used to it.(B) It lacks the vitamins and minerals essential for health.(C) It enhances immunity

14、 to certain diseases.(D)It helps people to live a much longer life.(A)Produce green food.(B) Waste no food.(C) Quit eating meats.(D)Grow vegetables.(A)They do not know any solution.(B) They do not give up drunk driving.(C) They do not behave in public places.(D)They do not admit being alcohol addict

15、s.(A)To stop them from fighting back.(B) To thank them for their hospitality.(C) To teach them the European lifestyle.(D)To relieve their pains and sufferings.(A)Without intervention they will be a headache to the nation.(B) With support they can be brought back to a normal life.(C) They readily res

16、pond to medical treatment.(D)They pose a serious threat to social stability.Section C26 Self-image is the picture you have of yourself, the sort of person you believe you are. Included in your self-image are the【B1】_in which you place yourself, the roles you play, and other similar descriptors you u

17、se to identify yourself. If you tell an【B2】_you are a grandfather who recently lost his wife and who does volunteer work on weekends, several elements of your self-image are brought to lightthe roles of grandparent, widower, and【B3】_citizen.But self-image is more than how you picture yourself: it al

18、so involves how others see you. Three types of feedback from others are【B4】_how they see us: confirmation, rejection, and disconfirmation. Confirmation occurs when others treat you in a manner【B5 】_with who you believe you are. You believe you have leadership abilities and your boss put you【B6】_a ne

19、w work team. On the other hand, rejection occurs when others treat you in a manner that is inconsistent with your【 B7】_. Pierre Salinger was appointed senator from California but subsequently lost his first election. He thought he was a good public official, but the voters【B8】_thought otherwisetheir

20、 vote was inconsistent with his self-concept. The third type of feedback is disconfirmation, which occurs when others fail to【B9 】_your notion of self by responding neutrally. A student writes what he thinks is an excellent composition, but the teacher writes no encouraging remarks. Rather than【B10】

21、_how others classify you, consider how you identify yourself. The way in which you identify yourself is the best reflection of your self-image.27 【B1 】28 【B2 】29 【B3 】30 【B4 】31 【B5 】32 【B6 】33 【B7 】34 【B8 】35 【B9 】36 【B10 】Section A36 Travel websites have been around since the 1990s, when Expedia,

22、Travelocity, and other holiday booking sites were launched, allowing travelers to compare flight and hotel prices with the click of a mouse. With information no longer【C1】_by travel agents or hidden in business networks, the travel industry was revolutionized, as greater transparency helped【C2】_pric

23、es.Today, the industry is going through a new revolutionthis time transforming service quality. Online rating platforms【C3】_in hotels, restaurants, apartments, and taxisallow travelers to exchange reviews and experiences for all to see.Hospitality businesses are now ranked, analyzed, and compared no

24、t by industry【C4】_, but by the very people for whom the service is intendedthe customer. This has【C5】_a new relationship between buyer and seller. Customers have always voted with their feet: they can now explain their decision to anyone who is interested. As a result, businesses are much more【C6】_,

25、 often in very specific ways, which creates powerful【C7】_to improve service.Although some readers might not care for gossipy reports of unfriendly bellboys (行李员) in Berlin or malfunctioning hotel hairdryers in Houston, the true power of online reviews lies not just in the individual stories, but in

26、the websites【C8】_to aggregate a large volume of ratings.The impact cannot be【C9】_. Businesses that attract top ratings can enjoy rapid growth, as new customers are attracted by good reviews and【C10 】_provide yet more positive feedback. So great is the influence of online ratings that many companies

27、now hire digital reputation managers to ensure a favorable online identity.A) accountable I) persistingB) capacity J) pessimisticC) controlled K) professionalsD) entail L) slashE) forged M) specializingF) incentives N) spectatorsG) occasionally O) subsequently H) overstated37 【C1 】38 【C2 】39 【C3 】40

28、 【C4 】41 【C5 】42 【C6 】43 【C7 】44 【C8 】45 【C9 】46 【C10 】Section B46 Plastic SurgeryA better credit card is the solution to ever larger hack attacksAA thin magnetic stripe (magstripe) is all that stands between your credit-card information and the bad guys. And theyve been working hard to break in. Th

29、ats why 2014 is shaping up as a major showdown: banks, law enforcement and technology companies are all trying to stop a network of hackers who are succeeding in stealing account numbers, names, email addresses and other crucial data used in identity theft. More than 100 million accounts at Target,

30、Neiman Marcus and Michaels stores were affected in some way during the most recent attacks, starting last November.BSwipe (刷卡 ) is the operative word: cards are increasingly vulnerable to attacks when you make purchases in a store. In several recent incidents, hackers have been able to obtain massiv

31、e information of credit-, debit- (借记) or prepaid-card numbers using malware, i. e. malicious software, inserted secretly into the retailers point-of-sale systemthe checkout registers. Hackers then sold the data to a second group of criminals operating in shadowy corners of the web. Not long after, t

32、he stolen data was showing up on fake cards and being used for online purchases.CThe solution could cost as little as $ 2 extra for every piece of plastic issued. The fix is a security technology used heavily outside the U. S. While American credit cards use the 40-year-old magstripe technology to p

33、rocess transactions, much of the rest of the world uses smarter cards with a technology called EMV (short for Europay, MasterCard, Visa) that employs a chip embedded in the card plus a customer PIN (personal identification number) to authenticate (验证 ) every transaction on the spot. If a purchaser f

34、ails to punch in the correct PIN at the checkout, the transaction gets rejected. (Online purchases can be made by setting up a separate transaction code. )DWhy havent big banks adopted the more secure technology? When it comes to mailing out new credit cards, its all about relative costs, says David

35、 Robertson, who runs the Nilson Report, an industry newsletter. “ The cost of the card, putting the sticker on it, coding the account number and expiration date, embossing (凸印) it, the small envelopeall put together, youre in the dollar range. “ A chip-and-PIN card currently costs closer to $3, says

36、 Robertson, because of the price of chips. (Once large issuers convert together, the chip costs should drop. )EMultiply $ 3 by the more than 5 billion magstripe credit and prepaid cards in circulation in the U. S. Then consider that theres an estimated $ 12. 4 billion in card fraud on a global basis

37、, says Robertson. With 44% of that in the U. S. , American credit-card fraud amounts to about $5.5 billion annually. Card issuers have so far calculated that absorbing the liability for even big hacks like the Target one is still cheaper than replacing all that plastic.FThat leaves American retailer

38、s pretty much alone the world over in relying on magstripe technology to charge purchasesand leaves consumers vulnerable. Each magstripe has three tracks of information, explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company. The

39、first and third are used by the bank or card issuer. Your vital account information lives on the second track, which hackers try to capture. “ Malware is scanning through the memory in real time and looking for data,“ he says. “ It creates a text file that gets stolen. “GChip-and-PIN cards, by contr

40、ast, make fake cards or skimming impossible because the information that gets scanned is encrypted (加密). The historical reason the U. S. has stuck with magstripe, ironically enough, is once superior technology. Our cheap, ultra-reliable wired networks made credit-card authentication over the phone f

41、rictionless. In France, card companies created EMV in part because the telephone monopoly was so maddeningly inefficient and expensive. The EMV solution allowed transactions to be verified locally and securely.HSome big banks, like Wells Fargo, are now offering to convert your magstripe card to a ch

42、ip-and-PIN model. (Its actually a hybrid (混合体) that will still have a magstripe, since most U. S. merchants dont have EMV terminals. ) Should you take them up on it? If you travel internationally, the answer is yes.IKeep in mind, too, that credit cards typically have better liability protection than

43、 debit cards. If someone uses your credit card fraudulently (欺诈性地), its the issuer or merchant, not you, that takes the hit. Debit cards have different liability limits depending on the bank and the events surrounding any fraud. “ If its available, the logical thing is to get a chip-and-PIN card fro

44、m your bank,“ says Eric Adamowsky, a co-founder of CreditCardInsider. com. “I would use credit cards over debit cards because of liability issues. “ Cash still works pretty well too.JRetailers and banks stand to benefit from the lower fraud levels of chip-and-PIN cards but have been reluctant for ye

45、ars to invest in the new infrastructure (基础设施) needed tor the technology, especially if consumers dont have access to it. Its a chicken-and-egg problem: no one wants to spend the money on upgraded point-of-sale systems that can read the chip cards if shoppers arent carrying themyet theres little poi

46、nt in consumers carrying the fancy plastic if stores arent equipped to use them. (An earlier effort by Target to move to chip and PIN never gained progress. ) According to Gumbley, theres a “you-first mentality. The logjam (僵局) has to be broken. “KJPMorgan Chase CEO Jamie Dimon recently expressed hi

47、s willingness to do so, noting that banks and merchants have spent the past decade suing each other over interchange feesthe percentage of the transaction price they keeprather than deal with the growing hacking problem. Chase offers a chip-enabled card under its own brand and several others for tra

48、vel-related companies such as British Airways and Ritz-Carlton.LThe Target and Neiman hacks have also changed the cost calculation: although retailers have been reluctant to spend the $ 6. 75 billion that Capgemini consultants estimate it will take to convert all their registers to be chip-and-PIN-c

49、ompatible, the potential liability they now face is dramatically greater. Target has been hit with class actions from hacked consumers. “ Its the ultimate nightmare,“ a retail executive from a well- known chain admitted to -TIME.MThe card-payment companies MasterCard and Visa are pushing hard for change. The two firms have warned all parties in the transaction chainmerchant, network, bankthat if they dont bec

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1