大学六级-839及答案解析.doc

上传人:刘芸 文档编号:1450748 上传时间:2020-02-01 格式:DOC 页数:43 大小:222.50KB
下载 相关 举报
大学六级-839及答案解析.doc_第1页
第1页 / 共43页
大学六级-839及答案解析.doc_第2页
第2页 / 共43页
大学六级-839及答案解析.doc_第3页
第3页 / 共43页
大学六级-839及答案解析.doc_第4页
第4页 / 共43页
大学六级-839及答案解析.doc_第5页
第5页 / 共43页
点击查看更多>>
资源描述

1、大学六级-839 及答案解析(总分:710.00,做题时间:90 分钟)一、Part Writing(总题数:1,分数:103.00)1.Directions: For this part, you are allowed 30 minutes to write a short essay entitled A Letter of Application. You should write at least 150 words following the outline given below:假如你是李明,正在找工作,需要写一封求职信,内容应包括以下几点:1. 渴望工作的愿望2. 个人技能和

2、经理3. 联系方式A Letter of Application(分数:103.00)_二、Part Reading Compr(总题数:1,分数:70.00)The Darkest Side of ID TheftMarch 9, 2003Malcolm Byrd was home on a Saturday night when a knock came. Three Rock Country, Wis., sheriffs officers were there with a warrant for Byrds arrest. Cocaine possession, with inten

3、t to distribute, it said. Byrd tried to tell them that they had the wrong man, that it was a case of mistaken identity. But they wouldnt listen. Instead they put him in handcuffs (手铐) and drove him away.It was nothing new for Byrd, who has spent much of the past five years tryingunsuccessfullyto tal

4、k skeptical police officers out of arresting him. But this time, it was worse. Two days later, he was still in jail.This is the worst thing for identity theft victims. Losing your clean credit history is one thing; losing you freedom is another. And victims of Americas fastest-growing crime are disc

5、overing they often have much more to worry about than the hundreds of hours of paperwork to clean up the financial mess associated with ID theft. Sometimes, they have to worry about being pushed in jailagain and again.Alias(化名) Becomes a DiseaseTheres nothing new about criminals using aliases to eva

6、de the law. Criminals often try to give their friends name, address, and date of birth to cheat police. But the explosion of identity theft, and the ready availability of stolen digital files on innocent victims, makes it just as easy for a criminal to give a strangers personal data during an arrest

7、 Once police book a suspect under a fake name, that mistake can plague a victim for life. The Alias becomes a disease to the true owner of that character.Getting names off those lists can be a big task. The problem is complicated by the increasing sophistication of law enforcement officials. “Offic

8、ials of criminal records arefor good reason reluctant to remove information once its been placed in the database,“ said Beth Givens, executive director of the Identity Theft Clearing House.His Word Against a DatabaseIn Byrds case, his word has never been enough. The situation has left the Janesville

9、 Wis. , man thinking about name changing. With his impostor (冒名顶替) still committing crimes and still using his name, Byrd fears another arrest. “I dont feel safe now. When we drive I feel uncomfortable,“ Byrd said. “Its affected our lives enormously.“Tom Schroeder, a famous lawyer, confirmed many o

10、f the details of Byrds repeated run-ins with the law. “Mr. Byrd is worried that if he is in Milwaukee County and gets stopped for some reason and the officer puts it into a computer, he may still come up,“ Schroeder said. “And I dont blame him.“Efforts to eliminate Byrds criminal record at the state

11、 and federal level havent succeeded, Schroeder said. “I left a voice mail on Mr. Byrds phone indicating wed be happy to help him change his name and his Social Security number.“How It BeganByrds nightmare began in 1998, he said. A man arrested on drug charges that year identified himself to local of

12、ficials as Malcolm Byrd.Thanks to an article in the local Janesville Gazette, the real Malcolm Byrd found out about the identity theft, and headed to the police to correct the error. The paper ran a correction, too. But that was hardly the end of the nightmare.Four months later, when he was stopped

13、for speeding, Byrd found himself face down on the pavement, handcuffed. Police records still showed that he was wanted for drug dealing.The matter was cleared up when officials compared a photo of the suspect to Byrd, but not before he had lost half a days wages sitting at the police station. Soon a

14、fter, Byrd was fired from his part-time job as a nursing assistant because he was accused of lying about his criminal record. Months later, he was laid off from his full-time job.A year later, while surfing the Internet, Byrd discovered his impostor had been arrested again, this time in a neighborin

15、g county. To clear his name, he visited the county district attorneys office and submitted his fingerprints. In exchange, Byrd received court documents proving his innocence. But that didnt stop him from losing his license a second time in 2000, he said.After that, life seemed back to normal until A

16、pril of last year, when Byrd was stopped again. Once again, he found himself in handcuffs in the back of a squad car, losing half a days pay until officers cleared up the confusion.But that was nothing compared to the most recent arrest, which took place over the Martin Luther King Jr. Day holiday w

17、eekend. Byrd had lent his car to his niece, who was stopped by police that Saturday night. “Do you know where Malcolm is?“ they asked her. Minutes later, three deputies were at Byrds home, armed with warrants from three counties.Byrds wife Carla ran to the sheriffs department around midnight that ni

18、ght with the court papers clearing her husbands name. But that didnt helpthe warrants were dated after Byrds declaration of innocence.How Common Is It?Byrds tale is extreme, but hardly unique. Most law enforcement officers say this type of criminal identity theft is rare. But the few reliable identi

19、ty theft statistics suggest it may he more common than they think. The rate of identity theft crimes doubles every year, and 12 percent of victims “found that they must deal with wrongful criminal records. “I think it is more common now because identity theft is a bigger problem,“ said Michael Groch

20、 deputy district attorney of San Diego Countys CATCH High Tech Crimes task force.California also has created a special identity theft registry to address the problem, a victims database that can be used to prevent a false arrest. If a victim is threatened with arrest by a police officer, the victim

21、 gives the officer a telephone number to call, and a PIN code. The officer then hears a message explaining that this person is an identity theft victim.How Does It Happen?It might seem elemental that arresting officers confirm the identity before arresting someone, but thats not as easy as it sounds

22、 Often, for lesser crimes, law enforcement officials simply take the criminals wordparticularly for “instant-release“ violations like traffic offenses.“If the suspect gives a name and date of birth, and if that information checks out, if the officer doesnt have any reason to doubt the person a lot

23、of times that is going to be the end of it,“ Groch said. “Its different than if they make up a name.“ But even for more serious offenses, like drug possession, police officers often wont do much to verify an identity, particularly if the suspect is an identity thief who has managed to obtain an offi

24、cial, state-issued drivers license.“You may be brought in or fingerprinted, and taken a photo, even appear before a magistrate (治安官) on a TV monitor. And out the door you go. No cross-checking is done,“ said Rob Douglas, a former Washington prosecutor (起诉人). “When people are arrested, its rare that

25、they will cross check with the national crime database because they already have you on a crime. Often times, the first time a thorough background will be done is at the time of sentencing.“So when identity thieves are released on bail, and never show up for their court hearings, a warrant is issued

26、 for the victimand the thief has pretty much beaten the system.Beating Technology with TechnologyThe difficulty of beating back bad data is at the core of the problem, and there are some proposed technological solutions. Instant fingerprint identification networks would cut down on misidentification

27、s, for example. Some locales have tested computers that showed each suspects photograph along with warrant information to the arresting officer at the scene; that would prevent some wrongful arrests. But both solutions have civil liberty implications, and both are costly.“I dont think there is a gre

28、at solution that is not going to invade peoples privacy and not going to cost a fortune,“ Groch said. “When someone say, Its not me, police have to be more sensitive and do a bit more checking. Cops have to follow their own common sense and need to take a little extra item.“Thats cold comfort to Mal

29、colm Byrds wife. She said her husband is probably safe for now, given the publicity he received from the Janesville Gazette and a local radio station.(分数:70.00)(1).Malcolm Byrd was arrested again on March 9, 2003, because _.(分数:7.00)A.he was a victim of identity theftB.the police officers arrested t

30、he wrong manC.he was found to possess some cocaineD.he was wanted by the police(2).Which of the following troubles is not caused by identity theft?(分数:7.00)A.Clean credit history.B.Loss of freedom.C.Financial mess.D.A lot of paperwork.(3).Once the police book a suspect under a fake name, it is diffi

31、cult to get the name off the list, because _.(分数:7.00)A.it is banned by policeB.the police are not willing to remove itC.it takes the police a lot of time to remove itD.it makes the police embarrassed(4).Tom Schroeder is(分数:7.00)A.good at defending those identity theft victimsB.indifferent to Byrds

32、caseC.worried about ByrdD.willing to help Byrd(5).Four months after he corrected the error, Byrd was arrested by the police because _.(分数:7.00)A.he was wanted for drug dealingB.he drove too fastC.he was mistaken for drug dealingD.he was found of drug dealing(6).After Byrds most recent arrest, his wi

33、fe wanted to clear his name but in vain, because _.(分数:7.00)A.the warrants were dated after Byrds declaration of innocenceB.the warrants were dated before Byrds declaration of innocenceC.Byrds declaration of innocence was dated after the warrantsD.it made no difference whether Byrd got a declaration

34、 of innocence or not(7).In order to _, California also has created a special identity theft registry.(分数:7.00)A.help those victimsB.make things rightC.make up for their mistakesD.prevent a mistaken arrest(8).When arresting someone, the arresting officers had better _ in case of identity theft.(分数:7.

35、00)填空项 1:_(9).Some proposed technological solutions, such as _, can be used to beat misidentification.(分数:7.00)填空项 1:_(10).Malcolm Byrds wife said that _ may bring her husband safety for now.(分数:7.00)填空项 1:_三、Part Listening Com(总题数:0,分数:0.00)四、Section A(总题数:4,分数:105.00)A.His parents detained his car

36、B.There is something wrong with his cars wheel.C.He was unable to drive a car because of his misadventure.D.His car was damaged by a ear accident.A.They can defeat their opponent effortlessly.B.Someone gave their information away to their rival.C.Their opponent thinks the same way they do.D.There i

37、s something unpractical in their plan.A.The woman likes Mias new hairstyle very much.B.Both the man and the woman do not like Mias new hairstyle.C.Because of Mias nice hairstyle, everyone is polite to her.D.Everyone thinks highly of Mias new hairstyle.A.The man is pleased to work for the woman.B.The

38、 man hoisted the suitcase without much effort.C.The woman doesnt know where to place her suitcase.D.The man considers the womans praise as flattery.A.Nowadays an iPod is very precious.B.The womens baby-sister is very hard to please.C.IPod gains great popularity in recent years.D.What the woman will

39、send her sister as a birthday present.A.They can improve their teams defense very quickly.B.They have lots of three-point shooters.C.Their team members can shoot accurately.D.Their three-point shooters are better than other teams.A.The man needs to talk to his son more.B.The mans son behaved badly i

40、n school.C.The woman has lots of reason to expel the mans son.D.The man always shows less care to his son.A.She is reluctant to change their trip.B.Himalayas is known for the peaceful atmosphere.C.She thinks she will enjoy this trip.D.Fresh air is the only thing she pursues.Questions 19 to 22 are ba

41、sed on the conversation you have just heard.(分数:28.00)A.Doing yoga.B.Jogging.C.Doing some weights.D.Learning breathing.A.Mental and physical health.B.Slim figure.C.Quick response.D.Proper thinking.A.Painful postures.B.Distorting body.C.Moneymaking trick.D.Useless meditation.A.Visiting yoga coach.B.J

42、oining a yoga class.C.Learning breathing.D.Keep on jogging as usual.Questions 23 to 25 are based on the conversation you have just heard.(分数:21.00)A.She sleeps less than her friend.B.She is confused and incompetent while working.C.She is annoyed by energy.D.Her friend can accomplish more tasks than

43、her.A.Flies need less sleep than humans.B.Humans need a similar amount of sleep with flies.C.The amount of human sleep is determined by certain gene.D.Flies can determine how much sleep they need.A.They can not accomplish their daily tasks.B.They suffer injuries from less amount of sleep.C.They get

44、no damage in their performance.D.They operate worse than normal.五、Section B(总题数:3,分数:70.00)Passage OneQuestions 26 to 29 are based on the passage you have just heard.(分数:28.00)A.Adding GPS, 3G, a higher-resolution camera.B.Adding some fringe benefits that make it appealing.C.Including operability wi

45、th more wireless carriers.D.Using less expensive but powerful chipsA.Apple.B.Energy Star.C.Sony.D.Microsoft.A.Product with lower energy consumption.B.Product without flaws.C.Product draining the worlds energy resources.D.Product shocked game-playing crowd.A.Pumping up the graphics prowess of their p

46、anels.B.Producing active game play.C.Moving computer game in a new direction.D.The success will go unchallenged.Passage TwoQuestions 30 to 32 are based on the passage you have just heard.(分数:21.00)A.Humans got equal teamwork with ants.B.Ants usually accomplish the most complex tasks.C.Ants communica

47、te through chemicals.D.Ants have an amazing ability to specialize behavior.A.By using their body to pave the way for others.B.By covering holes inside their nest.C.By determining which one is the best fit.D.By stepping on remainders back.A.Intelligence section.B.Cargo transfers on airplanes.C.Teleco

48、mmunication hardware moving.D.Data collecting technique.Passage ThreeQuestions 33 to 35 are based on the passage you have just heard.(分数:21.00)A.Water absorbing ability.B.The cells membrane.C.Its surroundings.D.The ability to maintain salt.A.They lose water constantly.B.They contain a relatively low

49、er concentration of salt.C.They neither lose nor absorb waterD.They possess a relatively higher concentration of salt.A.Excreting salt through gill cells.B.Losing more water to their surroundingsC.Drinking more water.D.Diluting the amount of salt.六、Section C(总题数:1,分数:77.00)What does it mean to say that we live in a world of persuasion

展开阅读全文
相关资源
猜你喜欢
  • STAS 12220 5-1985 Rubber insulated cables cud cords for mobile electrical wiring ORDINARY RUBBER SHEATHED FLEXIBLE CABLES Special technical requirements《橡胶绝缘电缆和电线,作移动电线 普通橡胶铠装软电缆 特.pdf STAS 12220 5-1985 Rubber insulated cables cud cords for mobile electrical wiring ORDINARY RUBBER SHEATHED FLEXIBLE CABLES Special technical requirements《橡胶绝缘电缆和电线,作移动电线 普通橡胶铠装软电缆 特.pdf
  • STAS 12220 6-1985 Rubber insulated cables and cords for mobile electrical wiring HEAVY RUBBER SHEATHED FLEXIBLE CABLES Special technical requirements《橡胶绝缘电缆和电线,作移动电线 重橡胶铠装软电缆 特殊技术要.pdf STAS 12220 6-1985 Rubber insulated cables and cords for mobile electrical wiring HEAVY RUBBER SHEATHED FLEXIBLE CABLES Special technical requirements《橡胶绝缘电缆和电线,作移动电线 重橡胶铠装软电缆 特殊技术要.pdf
  • STAS 12221-1984 TUBS WITH CAPACITY TO 10 m3 General technical requirements for quality《容量达3立方米的缸 一般质量技术要求 》.pdf STAS 12221-1984 TUBS WITH CAPACITY TO 10 m3 General technical requirements for quality《容量达3立方米的缸 一般质量技术要求 》.pdf
  • STAS 12222-1984 EXTERNAL IXYOUTTE SPUR (SEAR PAIR Geometrical and kinematic calculation《外渐开线齿轮对几何学与运动学计算 》.pdf STAS 12222-1984 EXTERNAL IXYOUTTE SPUR (SEAR PAIR Geometrical and kinematic calculation《外渐开线齿轮对几何学与运动学计算 》.pdf
  • STAS 12223-1984 EXTERNAL 1NVQLUTE PARALLEL HELICAL GEAR PAIR Geometric and kinematic calculation《外渐开线平行螺旋齿轮对几何学与运动学计算 》.pdf STAS 12223-1984 EXTERNAL 1NVQLUTE PARALLEL HELICAL GEAR PAIR Geometric and kinematic calculation《外渐开线平行螺旋齿轮对几何学与运动学计算 》.pdf
  • STAS 12224-1984 INTERNAL INVOLUTE SPUR GEAR PAIR Geometrical and kinematic calculation《内渐开线正齿轮对几何学与运动学尺寸 》.pdf STAS 12224-1984 INTERNAL INVOLUTE SPUR GEAR PAIR Geometrical and kinematic calculation《内渐开线正齿轮对几何学与运动学尺寸 》.pdf
  • STAS 12225-1984 INTERNAL INVOLUTE  PARALLEL HELICAL GEAR PAIR Geometrical and kinematic calculation《内渐开线“平行六角齿轮对”几何学与运动学尺寸 》.pdf STAS 12225-1984 INTERNAL INVOLUTE PARALLEL HELICAL GEAR PAIR Geometrical and kinematic calculation《内渐开线“平行六角齿轮对”几何学与运动学尺寸 》.pdf
  • STAS 12226 1-1986 AGRICULTURAL TRACTORS Coupling devices of agricultural machines Terminology《农用机械的农用拖拉机联结装置术语 》.pdf STAS 12226 1-1986 AGRICULTURAL TRACTORS Coupling devices of agricultural machines Terminology《农用机械的农用拖拉机联结装置术语 》.pdf
  • STAS 12226 2-1986 AGRICULTURAL TRACTORS Machine coupling devices Main parameters《农用拖拉机机械联结装置主要参数 》.pdf STAS 12226 2-1986 AGRICULTURAL TRACTORS Machine coupling devices Main parameters《农用拖拉机机械联结装置主要参数 》.pdf
  • 相关搜索

    当前位置:首页 > 考试资料 > 职业资格

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1