大学英语四级卷一真题2016年12月及答案解析.doc

上传人:registerpick115 文档编号:1457502 上传时间:2020-02-11 格式:DOC 页数:30 大小:163KB
下载 相关 举报
大学英语四级卷一真题2016年12月及答案解析.doc_第1页
第1页 / 共30页
大学英语四级卷一真题2016年12月及答案解析.doc_第2页
第2页 / 共30页
大学英语四级卷一真题2016年12月及答案解析.doc_第3页
第3页 / 共30页
大学英语四级卷一真题2016年12月及答案解析.doc_第4页
第4页 / 共30页
大学英语四级卷一真题2016年12月及答案解析.doc_第5页
第5页 / 共30页
点击查看更多>>
资源描述

1、大学英语四级卷一真题 2016 年 12 月及答案解析(总分:710.00,做题时间:130 分钟)一、Part I Writing (30 m(总题数:1,分数:106.50)1.irections:For this part, you are allowed 30 minutes to write an essay. Suppose you have two options upon graduation: one is to work in a state-owned business and the other in a joint venture. You are to make a

2、 choice between the two. Write an essay to explain the reasons for your choice. You should write at least 120 words but no more than 180 words.(分数:106.50)_二、Part II Listening Co(总题数:3,分数:49.70)Questions 1 to 2 are based on the conversation you have just heard.(分数:14.20)A.It was dangerous to live in.

3、B.It was going to be renovated.C.He could no longer pay the rent.D.He had sold it to the royal family.A.A strike.B.A forest fire.C.A storm.D.A terrorist attack.Questions 3 to 4 are based on the conversation you have just heard.(分数:14.20)A.They lost contact with the emergency department.B.They were t

4、rapped in an underground elevator.C.They were injured by suddenly falling rocks.D.They sent calls for help via a portable radio.A.They tried hard to repair the elevator.B.They released the details of the accident.C.They sent supplies to keep the miners warm.D.They provided the miners with food and w

5、ater.Questions 5 to 7 are based on the conversation you have just heard.(分数:21.30)A.Raise postage rates.B.Improve its services.C.Redesign delivery routes.D.Close some of its post offices.A.Shortening business hours.B.Closing offices on holidays.C.Stopping mail delivery on Saturdays.D.Computerizing m

6、ail sorting processes.A.Many post office staff will lose their jobs.B.Many people will begin to complain.C.Taxpayers will be very pleased.D.A lot of controversy will arise.三、Section B(总题数:2,分数:56.80)Questions 8 to 11 are based on the conversation you have just heard.(分数:28.40)A.He will be kept from

7、promotion.B.He will go through retraining.C.He will be given a warning.D.He will lose part of his pay.A.He is always on time.B.He is a trustworthy guy.C.He is an experienced press operator.D.He is on good terms with his workmates.A.She is a trade union representative.B.She is in charge of public rel

8、ations.C.She is a senior manager of the shop.D.She is better at handling such matters.A.He is skilled and experienced.B.He is very close to the manager.C.He is always trying to stir up trouble.D.He is always complaining about low wages.Questions 12 to 15 are based on the conversation you have just h

9、eard.(分数:28.40)A.Open.B.Selfish.C.Friendly.D.Reserved.A.They stay quiet.B.They read a book.C.They talk about the weather.D.They chat with fellow passengers.A.She was always treated as a foreigner.B.She was eager to visit an English castle.C.She was never invited to a colleagues home.D.She was unwill

10、ing to make friends with workmates.A.She was unwilling to make friends with workmates.B.Houses provide more privacy.C.They want to have more space.D.They want a garden of their own.四、Section C(总题数:3,分数:142.00)Questions 16 to 18 are based on the conversation you have just heard.(分数:42.60)A.They dont

11、have much choice of jobs.B.They are likely to get much higher pay.C.They dont have to go through job interviews.D.They will automatically be given hiring priority.A.Ask their professors for help.B.Look at school bulletin boards.C.Visit the school careers service.D.Go through campus newspapers.A.Help

12、ing students find the books and journals they need.B.Supervising study spaces to ensure a quiet atmosphere.C.Helping students arrange appointments with librarians.D.Providing students with information about the library.Questions 19 to 21 are based on the conversation you have just heard.(分数:42.60)A.

13、It tastes better.B.It is easier to grow.C.It may be sold at a higher price.D.It can better survive extreme weathers.A.It is healthier than green tea.B.It can grow in drier soil.C.It will replace green tea one day.D.It is immune to various diseases.A.It has been well received by many tea drinkers.B.I

14、t does not bring the promised health benefits.C.It has made tea farmers life easier.D.It does not have a stable market.Questions 22 to 25 are based on the conversation you have just heard.(分数:56.80)A.They need decorations to show their status.B.They prefer unique objects of high quality.C.They decor

15、ate their homes themselves.D.They care more about environment.A.They were proud of their creations.B.They could only try to create at night.C.They made great contributions to society.D.They focused on the quality of their products.A.Make wise choices.B.Identify fake crafts.C.Design handicrafts thems

16、elves.D.Learn the importance of creation.A.To boost the local economy.B.To attract foreign investments.C.To arouse public interest in crafts.D.To preserve the traditional culture.五、Part III Reading Com(总题数:1,分数:35.50)Many men and women have long bought into the idea that there are “male” and “female

17、” brains, believing that explains just about every difference between the sexes. A new study (26)that belief, questioning whether brains really can be distinguished by gender. In the study, Tel Aviv University researchers(27)for sex differences the entire human brain. And what did they find? Not muc

18、h. Rather than offer evidence for(28)brains as “male” or “female,” research shows that brains fall into a wide range, with most people falling right in the middle. Daphna Joel, who led the study, said her research found that while there are some gender-based(29) , many different types of brain cant

19、always be distinguished by gender. While the “average” male and “average” female brains were(30)different, you couldnt tell it by looking at individual brain scans. Only a small(31)of people had “all-male” or “all-female” characteristics. Larry Cahill, an American neuroscientist (神经科学家),said the stu

20、dy is an important addition to a growing body of research questioning(32) beliefs about gender and brain function. But he cautioned against concluding from this study that all brains are the same,(33)of gender. “Theres a mountain of evidence(34)the importance of sex influences at all levels of brain

21、 function,” he told The Seattle Times. If anything, he said, the study(35) that gender plays a very important role in the brain “even when we are not clear exactly how.” A) abnormal B) applied C) briefly D) categorizing E) challenges F) figure G) percentage H) proving I) regardless J) searched K) si

22、milarities L) slightly M) suggests N) tastes O) traditional(分数:35.50)A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K

23、.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.六、Section B(总题数:1,分数:71.00)Can Burglars Jam Your Wireless Security System? AAny product that promises to protect your home deserves careful examination. So it isnt surprising that youll find plenty of strong opinions about the pote

24、ntial vulnerabilities of popular home-security systems. BThe most likely type of burglary (入室盗窃) by far is the unsophisticated crime of opportunity, usually involving a broken window or some forced entry. According to the FBI, crimes like these accounted roughly two-thirds of all household burglarie

25、s in the US in 2013.The wide majority of the rest were illegal, unforced entries that resulted from something like a window being left open. The odds of a criminal using technical means to bypass a security system are so small that the FBI doesnt even track those statistics. COne of the main theoret

26、ical home-security concerns is whether or not a given system is vulnerable to being blocked from working altogether. With wired setups, the fear is that a burglar (入室盗贼) might be able to shut your system down simply by cutting the right cable. With a wireless setup, you stick battery-powered sensors

27、 up around your home that keep an eye on windows, doors, motion, and more. If they detect something wrong while the system is armed, theyll transmit a wireless alert signal to a base station that will then raise the alarm. That approach will eliminate most cord-cutting concernsbut what about their w

28、ireless equivalent, jamming? With the right device tuned to the right frequency, whats to stop a thief from jamming your setup and blocking that alert signal from ever reaching the base station? DJamming concerns are nothing new, and theyre not unique to security systems. Any device thats built to r

29、eceive a wireless signal at a specific frequency can be overwhelmed by a stronger signal coming in on the same frequency. For comparison, lets say you wanted to “jam” a conversation between two peopleall youd need to do is yell in the listeners ear. E Security devices are required to list the freque

30、ncies they broadcast onthat means that a potential thief can find what they need to know with minimal Googling. They will, however, need so know what system theyre looking for. If you have a sign in your yard declaring what setup you use, thatd point them in the right direction, though at that point

31、, were talking about a highly targeted, semi-sophisticated attack, and not the sort forced-entry attack that makes up the majority of burglaries. Its easier to find and acquire jamming equipment for some frequencies than it is for others. F Wireless security providers will often take steps to help c

32、ombat the threat of jamming attacks. SimpliSafe, winner of our Editors Choice distinction, utilizes a special system thats capable of separating incidental RF interference from targeted jamming attacks. When the system thinks its being jammed, itll notify you via push alert(推送警报).From there, its up

33、to you to sound the alarm manually. G SimpliSafe was singled out in one recent article on jamming, complete with a video showing the entire system being effectively bypassed with handheld jamming equipment. After taking appropriate measures to contain the RF interference to our test lab, we tested t

34、he attack out for ourselves, and were able to verify that its possible with the right equipment. However, we also verified that SimpliSafes anti-jamming system works. It caught us in the act, sent an alert to my smartphone, and also listed our RF interference on the systems event log. The team behin

35、d the article and video in question make no mention of the system, or whether or not in detected them. HWe like the unique nature of that software. It means that a thief likely wouldnt be able to Google how the system works, then figure out a way around it. Even if they could, SimpliSafe claims that

36、 its system is always evolving, and that it varies slightly from system to system, which means there wouldnt be a universal magic formula for cracking it. Other systems also seem confident on the subject of jamming. The team at Frontpoint addresses the issue in a blog on its site, citing their own j

37、am protection software and claiming that there arent any documented cases of successful jam attack since the company began offering wireless security sensors in the 1980s. I Jamming attacks are absolutely possible. As said before, with the right equipment and the right know-how, its possible to jam

38、any wireless transmission. But how probable is it that someone will successfully jam their way into your home and steal your stuff? J Lets imagine that you live in a small home with a wireless security setup that offers a functional anti-jamming system. First, a thief is going to need to target your

39、 home, specifically. Then, hes going to need to know the technical details of your system and acquire the specific equipment necessary for jamming your specific setup. Presumably, you keep your doors locked at night and while youre away. So the thief will still need to break in. That means defeating

40、 the lock somehow, or breaking a window. Hell need to be jamming you at this point, as a broken window or opened door would normally release the alarm. So, too, would the motion detectors in your home, so the thief will need to continue jamming once hes inside and searching for things to steal. Howe

41、ver, hell need to do so without tripping the anti-jamming system, the details of which he almost certainly does now have access to. KAt the end of the day, these kinds of systems are primarily designed to protect against the sort of opportunistic smash-and-grab attack that makes up the majority of b

42、urglaries. Theyre also only a single layer in what should ideally be a many-sided approach to securing your home, one that includes common sense things like sound locks and proper exterior lighting at night. No system is impenetrable, and none can promise to eliminate the worst case completely. Ever

43、y one of them has vulnerabilities that a knowledgeable thief could theoretically exploit. A good system is one that keeps that worst-case setting as improbable as possible while also offering strong protection in the event of a less-extraordinary attack.(分数:71.00)(1).It is possible for burglars to m

44、ake jamming attacks with the necessary equipment and skill.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(2).Interfering with a wireless security system is similar to interfering with a conversation.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(3).A burglar has to continuously jam the wireless security device to avoid triggerin

45、g the alarm, both inside and outside the house.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(4).SimpliSafe provides devices that are able to distinguish incidental radio interference from targeted jamming attacks.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(5).Only a very small proportion of burglaries are committed by techni

46、cal means.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(6).It is difficult to crack SimpliSafe as its system keeps changing.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(7).Wireless devices will transmit signals so as to activate the alarm once something wrong is detected.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(8).Different measures s

47、hould be taken to protect ones home from burglary in addition to the wireless security system.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(9).SimpliSafes device can send a warning to the house owners cellphone.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.(10).Burglars can easily get a security devices frequency by Internet se

48、arch.(分数:7.10)A.B.C.D.E.F.G.H.I.J.K.七、Section C(总题数:2,分数:142.00)Questions 46 to 50 are based on the following passage. As a person who writes about food and drink for a living. I couldnt tell you the first thing about Bill Perry or whether the beers he sells are that great. But I can tell you that I

49、 like this guy. Thats because he plans to ban tipping in favor of paying his servers an actual living wage. I hate tipping. I hate it because its an obligation disguised as an option. I hate it for the post-dinner math it requires of me. But mostly, I hate tipping because I believe I would be in a better place if pay decisions regarding employees were simply left up to their employers, as is the custom in virtually eve

展开阅读全文
相关资源
猜你喜欢
  • ITU-T Z 109-2013 Specification and Description Language – Unified modeling language profile for SDL-2010 (Study Group 17)《(预发布)规范描述语言统一建模语言简介sdl-2010》.pdf ITU-T Z 109-2013 Specification and Description Language – Unified modeling language profile for SDL-2010 (Study Group 17)《(预发布)规范描述语言统一建模语言简介sdl-2010》.pdf
  • ITU-T Z 110-2008 Criteria for use of formal description techniques by ITU-T (Study Group 17)《ITU电信标准化领域(ITU-T)正式描述技术的使用标准》.pdf ITU-T Z 110-2008 Criteria for use of formal description techniques by ITU-T (Study Group 17)《ITU电信标准化领域(ITU-T)正式描述技术的使用标准》.pdf
  • ITU-T Z 111-2016 Notations and guidelines for the definition of ITU-T languages《ITU-T语言定义的符号和指南》.pdf ITU-T Z 111-2016 Notations and guidelines for the definition of ITU-T languages《ITU-T语言定义的符号和指南》.pdf
  • ITU-T Z 119-2007 Guidelines for UML profile design《(预发布)UML模式设计指南》.pdf ITU-T Z 119-2007 Guidelines for UML profile design《(预发布)UML模式设计指南》.pdf
  • ITU-T Z 120-2011 Message Sequence Chart (MSC) (Study Group 17)《消息序列图(MSC) 17号研究组》.pdf ITU-T Z 120-2011 Message Sequence Chart (MSC) (Study Group 17)《消息序列图(MSC) 17号研究组》.pdf
  • ITU-T Z 121 FRENCH-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC)《规范和描述语言(SDL)数据与消息序列图(MSC)的绑定 Z系列 电信系统的语言和通用软件方面 形式描述技术(FDT)消息序列表(.pdf ITU-T Z 121 FRENCH-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC)《规范和描述语言(SDL)数据与消息序列图(MSC)的绑定 Z系列 电信系统的语言和通用软件方面 形式描述技术(FDT)消息序列表(.pdf
  • ITU-T Z 121 SPANISH-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC)《规范和描述语言(SDL)数据与消息序列图(MSC)的绑定 Z系列 电信系统的语言和通用软件方面 形式描述技术(FDT)消息序列表.pdf ITU-T Z 121 SPANISH-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC)《规范和描述语言(SDL)数据与消息序列图(MSC)的绑定 Z系列 电信系统的语言和通用软件方面 形式描述技术(FDT)消息序列表.pdf
  • ITU-T Z 121-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC) SERIES Z LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYess.pdf ITU-T Z 121-2003 Specification and Description Language (SDL) data binding to Message Sequence Charts (MSC) SERIES Z LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYess.pdf
  • ITU-T Z 130 AMD 1 SPANISH-2006 Extended Object Definition Language (eODL) Techniques for distributed software component development – Conceptual foundation notations and technologyCID.pdf ITU-T Z 130 AMD 1 SPANISH-2006 Extended Object Definition Language (eODL) Techniques for distributed software component development – Conceptual foundation notations and technologyCID.pdf
  • 相关搜索

    当前位置:首页 > 考试资料 > 职业资格

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1