ImageVerifierCode 换一换
格式:DOC , 页数:15 ,大小:61KB ,
资源ID:857947      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-857947.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷163(无答案).doc)为本站会员(twoload295)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷163(无答案).doc

1、大学英语四级(2013 年 12 月考试改革适用)模拟试卷 163(无答案)一、Part I Writing1 For this part, you are allowed 30 minutes to write a short essay entitled There Is No End to Learning by commenting on the famous saying, “Education is not complete with graduation.“ You should write at least 120 words but no more than 180 word

2、s. Write your essay on Answer Sheet 1.There Is No End to LearningSection A(A)Their death rate is too high to be neglected.(B) Governments pay little attention to the issue.(C) They want to win the publics praise.(D)There are little data about them to do research.(A)Maternal death.(B) Various types o

3、f injuries.(C) Infectious disease.(D)Natural disaster.(A)The White House warned them not to do now.(B) The panel of experts objected the proposals.(C) NASA didnt get adequate money.(D)It would be too costly to do so.(A)By loaning money from the state bank.(B) By cooperating with private enterprises.

4、(C) By resorting to commercial banks.(D)By intensifying structural adjustment.(A)LG has exposed new concept TVs.(B) The market of TVs decreased.(C) TV will be replaced by computers.(D)LG is lagging behind in the TV competition.(A)They will be sold in stores this year.(B) They will be mass-produced.(

5、C) The price of them is not very high.(D)One of them can be rolled up like a newspaper.(A)CES technology expo.(B) Ultra-high definition televisions.(C) Distinguishable technology.(D)Creative concepts like LGs.Section B(A)His inbox was broken.(B) He made a big mistake.(C) The meeting was put off.(D)T

6、he work was postponed.(A)There is a bunch of coffee.(B) It is full of misplaced memos.(C) The secretary works beside it.(D)Things get piled up there.(A)It has not been sent out yet.(B) It was posted in the break room.(C) It never got to the mans inbox.(D)It was misplaced by the man.(A)Ask the secret

7、ary about the memo.(B) Talk to his friends about the secret.(C) Read the memo to get the truth.(D)Take a bunch of coffee breaks.(A)She cant have a break again.(B) The tires of her car are broken.(C) She cant sell her car in the shop.(D)Her car is being repaired again.(A)He is incapable of repairing

8、old cars.(B) He may overcharge her for the repairing.(C) He may make an incorrect estimate.(D)He doesnt know much about cars.(A)Offer the woman a ride home.(B) Write the homework for the woman.(C) Drive the woman back to campus.(D)Recommend a new car mechanic to the woman.(A)Move back to live on cam

9、pus.(B) Leave alone those troubles.(C) Pay a visit to the dormitory.(D)Move to live near the campus.Section C(A)People who are over 65 years old.(B) People whose life is different from younger ones.(C) People who retire from full-time work.(D)People who live, far away from their family.(A)Money.(B)

10、Safety.(C) Family.(D)Health.(A)Communities near their family.(B) Communities in big cities.(C) Communities in warm climates.(D)Communities in the countryside.(A)The number of senior citizens is increasing rapidly.(B) The problem of senior citizen becomes more serious.(C) Senior citizens are less act

11、ive than before.(D)More senior citizens are involved in politics.(A)She was famous for her sharply funny comments.(B) She served as the governor of Texas for 2 years.(C) She helped black people to get their rights.(D)She worked as a teacher of four students.(A)Deputy Secretary.(B) Foreign minister.(

12、C) Country commissioner.(D)State governor.(A)Ann Richards created a world for all the young people.(B) Ann Richards was the greatest feminist in the US.(C) Ann Richards helped young girls find their places.(D)Ann Richards was a kind-hearted person.(A)Accepting the criticism and ignore the praise.(B)

13、 Understanding the reason behind peoples criticism.(C) Stopping caring other peoples opinions.(D)Smiling to all the praise and criticism.(A)Thank the person.(B) Correct it happily.(C) Ignore the mistake.(D)Cancel the publication.(A)The topic is worth discussing again.(B) The topic is funny and meani

14、ngful.(C) The topic needs to be well understood.(D)The topic has to be changed.Section A26 Could the reason for the worlds economic misfortunes all come down to finger length? Although certainly an oversimplification of our【C1】_troubles, scientists have shown that financial traders who lose the bigg

15、est dollars are more【C2】_to have shorter ring fingers than index fingers.Former Wall Street trader and scientist John Coates of the University of Cambridge wondered whether finger ratio really correlated with trader success. His team【C3 】_that traders with the lowest index-to-ring-finger ratios made

16、 the most money over a 20-month period, even when the researchers controlled for years of experience. They averaged the【C4】_of $1,232,590, nearly six times more than that of men with【C5】_ratios. “I almost fell off my chair,“ says Coates. “I could not believe what I was seeing.“Tim Harford, a columni

17、st for the Financial Times and author of The Logic of Life: The Rational Economics of an Irrational World, calls the study “fascinating.“ He says hes glad to see that economists have【C6 】_looking at financial markets in terms of natural【C7】_instead of looking at them in terms of rational people maki

18、ng rational decisions.Coates,【C8】_, says it is important to note that this study【C9】_on only one type of trading, and increased confidence and quick reactions may in fact be an obstacle to those trading over long periods of time, like investors at hedge funds and investment banks. “Each【C10】_of trad

19、ing may require a different set of traits,“ he says.A)focuses E)strengthens I)high M)moreoverB)started F)likely J)conventional N)selectionC)however G)equivalent K)found O)currentD)figure H)style L)studied27 【C1 】28 【C2 】29 【C3 】30 【C4 】31 【C5 】32 【C6 】33 【C7 】34 【C8 】35 【C9 】36 【C10 】Section B36 18-

20、to24-year-olds Most at Risk for ID TheftARyan Thomas, an airman in the Air Force Honor Guard, bought some DVDs on the Internet using his cash card. It was a $20 payment made from his account, which had about $900. But the following day, his account balance was zero. Someone had stolen his account in

21、formation and bought computer games and other items. “I didnt know better about securing your information on the computer,“ said Thomas. After the incident, Thomas took a class about how to protect information in cyberspace. But last month, he was hit again, this time by someone who targeted his acc

22、ount from Malaysia. Similar identity-theft cases are rising sharply across the country, as young peoplesometimes careless about their personal informationare hit the hardest, according to a survey released last month.BIdentity fraud can include stealing a credit card number or opening a bank account

23、 in someone elses name. Thieves generally cross state lines in the commission of their crimes and are often linked to rings overseas in places such as Russia and Spain. The young people, ages 18 to 24, is at the greatest risk because it takes them longer to figure out that they have been defraudedme

24、aning their information is compromised for a longer period, according to the survey, which is a typical scene of the identity fraud landscape from last year.C“The young people dont protect enough or detect enough,“ said James Van Dyke, president of Javelin Strategy & Research, a California-based com

25、pany that examined where identity theft threats are coming from and what effects they are having on consumers. It takes young people an average of 132 days to detect fraud activity on their credit cards, bank accounts and other personal holdings, and those in older age groups average 49 days, the su

26、rvey shows. When their identities are stolen, the young people are victimized by thieves for an average of about five months.D“The 18-to-24 group is unique. Theyre going to college. Theyre away from home for the first time. Theyre sharing more information. More of their information is exposed,“ Van

27、Dyke said. “The old stereotype is true that people are sharing information willingly or unwillingly and are waiting until they become a victim to listen to sound advice.“ Thieves stole $400 from law student Gregory Peltz after he opened a tab at an Ohio dive bar, giving the waiter his cash card for

28、the evening as he rang up drinks. He was shocked when his bank called him days later and told him that someone had withdrawn cash from the account, even without the card. “I felt clueless,“ said Peltz. He said he would have no problem handing over his cash card again for a night out at a barjust not

29、 the same dive as last time.ELast year, there were an estimated 11.1 million identity fraud victims of all ages, a 12 percent increase from the year before, according to the survey. Thieves stole about $54 billion from them, according to the study, which surveyed 5,000 people nationwide, 703 of whom

30、 had been victims of identity theft. Javelin Research, which sells data studies to businesses and consumers, conducts surveys of consumer attitudes and behaviors on a variety of financial matters, including security, risk and fraud. Its most recent identity fraud study found that in addition to well

31、-known methods of thieving such as stealing wallets and credit cards, criminals are increasingly using high-tech methods of stealing.FAmong the common schemes: phishing(in which e-mails direct a victim to false Web sites that imitate respectable organizations, including banks), smishing(in which tex

32、t messages lure a victim into downloading wicked spyware), pharming(in which wicked code on computer sends victims to false Web sites)and keylogging(in which hidden software monitors victims keystrokes to collect passwords). When people are victimized with those methods, its much harder to detect, o

33、ften leaving them with no explanation about how their identities were stolen. Only about half of the victims file police reports, the study found.GIdentity thieves steal an average of $4,841 per victim, but the end cost to each person is about $373, because banks generally pay back the victims. The

34、study looked at social networking sites such as Facebook and MySpace and found that the young people are compromised more than other groups on the sites but that, in general, the sites account for small percentages of identity theft. Seven percent of young people said their financial information was

35、 compromised because of a social networking site, compared with 2 to 4 percent for other age groups. But theres a warning: About 55 percent of victims never figure out how their information was stolen.HMary Madden, senior research specialist at the Pew Research Centers Internet & American Life Proje

36、ct, said 72 percent of the young people use social networking sites daily, compared with 40 percent of adults 30 or older. She said young people share personal information about themselves, whether it is their birth date, phone number or a picture from a party, as a way to nourish relationships.I“Yo

37、u are trading information about yourself as a form of cultural currency,“ Madden said. “By posting a photo or an update about what you did at a bar last night, you are sharing with friends to have an exchange and continue a friendship.“ Problems arise, she said, when the information is misused. “Its

38、 an interesting balance they have to strike in deciding how much to share in order to start or maintain a relationship but not overshare with their network,“ she said.JMadden pointed to studies that show most people can be identified with three pieces of information: their sex, Zip code and date of

39、birth. And seemingly unnamed profiles that catalogue preferences, such as movie lists on Netflix, can also be used to identify users. Adam Morrison, 19, a freshman at Arizona State University, realized that his identity had been stolen a few summers ago when he applied for a job and figured out that

40、 someone had been using his Social Security number for his own employment purposes. Morrisons bank account was not affected, but he remains annoyed about how long the person had been using the Social Security number and how it was stolen. “No idea how he got it,“ Morrison said.37 A recent study of i

41、dentity fraud by Javelin Research showed that criminals tended to steal private information with high technology.38 Someone stole Adam Morrisons Social Security number with the purpose of his own employment.39 It is hard to detect certain high-tech methods of stealing, like keylogging and smishing.4

42、0 According to Madden, young people share their personal information as a way to nourish relationships.41 The youth group of 18-to-24 years old is unique in that they are away from home for the first time and their personal information is more likely to be exposed.42 Young people are hit the hardest

43、 in the identity-theft because it takes longer for them to detect fraud activity.43 Ryan Thomass personal information was stolen again even after he had taken a course about how to protect information on the Internet.44 Young people are struggling to keep the balance between sharing information to m

44、aintain a relationship and avoiding oversharing with their network.45 Javelin Strategy & Research aims to examine where identity theft threats are coming from and what effects they are having on victims.46 The end loss of the identity fraud victims is much less than thieves actually steal because th

45、e victims get most money back from the bank.Section C46 Earlier this year I met with a group of women in Matela, a small farming village in Tanzania, and we discussed something thats been on all of our minds lately: finding a safe place to save money. The women said their babies were getting sick fr

46、om malaria(疟疾), and they could afford the drugs if they saved money over timebut with no access to formal savings accounts, they had a hard time safeguarding cash So they saved in risky and inefficient ways. They made loans to each other, or bought goats or jewelry, then sold them if they suddenly n

47、eeded money.The success of microloans has opened new opportunities for many poor people and has been a crucial factor in reducing poverty. But loans are not enough. Savings accounts could help people in the developing world with unexpected events, accumulate money to invest in education, increase th

48、eir productivity and income, and build their financial security. Fortunately, this is a moment of opportunity. New policy ideas are uniting in ways that will lower the cost of savings and bring safe financial services to the doorsteps of the poor.One exciting trend is agent banking, in which stores

49、and post offices serve as banking outlets. Banks still manage and guarantee the deposits, but they rely on the infrastructure(基础设施)of other outlets to deal with clients where there are no bank branches.The phenomenal growth of mobile phones in the developing world presents another opportunity. M-Pesa, the mobile-phone cash-transfer service in Kenya, has signed up more than 5 million subscribers in two years and recently expanded to Tanzania. This new idea is opening markets and tr

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1