雅思-45及答案解析.doc

上传人:sumcourage256 文档编号:1464633 上传时间:2020-02-26 格式:DOC 页数:35 大小:222.50KB
下载 相关 举报
雅思-45及答案解析.doc_第1页
第1页 / 共35页
雅思-45及答案解析.doc_第2页
第2页 / 共35页
雅思-45及答案解析.doc_第3页
第3页 / 共35页
雅思-45及答案解析.doc_第4页
第4页 / 共35页
雅思-45及答案解析.doc_第5页
第5页 / 共35页
点击查看更多>>
资源描述

1、雅思-45 及答案解析(总分:79.00,做题时间:90 分钟)一、BListening Modul(总题数:0,分数:0.00)二、BSECTION 1: QUES(总题数:4,分数:10.00)Listen to the conversation between two friends who are talking outside an examination room.Questions 1-2Choose the correct letter from A-C for each answer. (分数:2.00)(1).Why cant Peter relax over the th

2、ree-week vacation? A. He needs to earn some money. B. Hes worried about next semester. C. He cant afford to go away.(分数:1.00)A.B.C.D.(2).What does Crystal plan to do on the holidays? A. Shes going to visit her family. B. Shes going to get a job. C. She hasnt got any idea.(分数:1.00)A.B.C.D.Questions 3

3、-5Listen to the directions and identify the place names of Questions 3-5 on the campus map below. Choose your answers from the list of place names in the box.NOTE: There are more place names listed than you will need.List of Place Names: I BlockC BlockStudent Employment OfficeStudent CanteenBookshop

4、(分数:3.00)(1)._(分数:1.00)填空项 1:_(2)._(分数:1.00)填空项 1:_(3)._ (分数:1.00)填空项 1:_Questions 6-7Complete the sentences below.Use NO MORE THAN THREE WORDS OR A NUMBER for each answer. (分数:2.00)(1).First, Peter and Crystal must have a/an _(分数:1.00)填空项 1:_(2).Peter and Crystal arrange to meet at _ on Friday.(分数:

5、1.00)填空项 1:_Questions 8-10Complete the table below.Use NO MORE THAN ONE WORD OR A NUMBER for each answer. Surname Contact Phone Number Student NumberPeter UU 8 /U/U UU 9 /U/U B 723466LU UU 10 /U/U(分数:3.00)填空项 1:_填空项 1:_填空项 1:_三、BSECTION 2: QUES(总题数:2,分数:10.00)Questions 11-13Choose the correct letter

6、 from A-C for each answer (分数:3.00)(1).The main aim of the festival spokesperson at the gathering is to A. welcome visitors to Brisbane. B. give away some tickets to the Brisbane Festival. C. provide information regarding the Festival.(分数:1.00)A.B.C.D.(2).The program for the Brisbane Festival includ

7、es performers from A. local and international destinations. B. Australian, Asian and European destinations. C. Australian and international destinations.(分数:1.00)A.B.C.D.(3).The Brisbane Festival will schedule activities and performances A. at indoor and outdoor venues. B. over 290 days. C. in tradi

8、tional performance centres around the city.(分数:1.00)A.B.C.D.Questions 14-20Complete the table below.Use NO MORE THAN THREE WORDS OR A NUMBER for each answer Type of Activity Date Time Name of Event VenueMusic 8 Sept. 8p.m.Israel Philharmonic OrchestraPerforming Arts CentreDrama UU 4 /U/U6:30p.m. Mon

9、key Power HouseUU 5 /U/U 11 Sept. 8 p.m.Sumi Jo with Queensland OrchestraMusic Wed. - Sat. UU 6 /U/U City GardensVisual ArtsFrom UU 7 /U/U Asia-Pacific Triennial Art GalleryDrama 15 Sept. 6 p.m. Slavas Snowshow UU 8 /U/UMusic From 20 Sept. 8 p.m. Barbara Fordham in concert UU 9 /U/UPoetry From 22 Se

10、pt. Poetry Festival Writing 4Oct.6Oct. Writers Festival Music 6 Oct. 6 p.m. UU 10 /U/UOperaCity Gardens(分数:7.00)填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_四、BSECTION 3: QUES(总题数:2,分数:9.00)Questions 22-24Complete the table below.Use NO MORE THAN THREE WORDS OR A NUMBER for each answer. COUNTRY

11、PROFILESSingapore MalaysiaArea of land: 630 square kilometresUU 2 /U/Usquare kilometresPopulation:Approximate ethnic mix:UU 3 /U/UUU 4 /U/UChinese14% Malay9% IndianUnder 24 million65% Malay (Bumiputera)26% Chinese8% Indian(分数:3.00)填空项 1:_填空项 1:_填空项 1:_Questions 25-30Complete the sentences below.Use

12、NO MORE THAN THREE WORDS for each answer.(分数:6.00)(1).Australias relationship with Singapore has been _.(分数:1.00)填空项 1:_(2).Trade between Singapore and Australia is _.(分数:1.00)填空项 1:_(3).Singapore and Malaysia share _ and _ as their top trading partners.(分数:1.00)填空项 1:_(4).There has been an increase

13、 in _ between Australia and Malaysia.(分数:1.00)填空项 1:_(5).Nancy found that the government in Singapore invested a lot in _.(分数:1.00)填空项 1:_(6).Nancy and Jenny thought that Malaysia has a good balance of _ customs.(分数:1.00)填空项 1:_五、BSECTION 4: QUES(总题数:4,分数:10.00)Questions 31-32Complete the sentences

14、below.Use NO MORE THAN THREE WORDS for each answer. (分数:2.00)(1).For _ there have been vegetarians.(分数:1.00)填空项 1:_(2).True vegans will only eat food which _ .(分数:1.00)填空项 1:_Questions 33-34Choose TWO letters from A - E for each answer.33 34. Which two reasons are NOT given in the lecture for adopti

15、ng vegetarianism?A. religious beliefsB. environmental reasonsC. peer pressureD. costE. social acceptance(分数:2.00)填空项 1:_填空项 1:_Questions 35-36Choose TWO letters from A-E for each answer.35 36. Which two health issues are NOT used in the lecture to promote vegetarianism as healthy?A. reduced heart di

16、seaseB. lower risk of contracting cancerC. reduced blood sugar levelsD. fewer weight-related problemsE. lower risk of stomach ulcers(分数:2.00)填空项 1:_填空项 1:_Questions 37-39Complete the following table.Use NO MORE THAN THREE WORDS for each answer.VITAMIN AND MINERAL INTAKE Available non-vegetarians in.

17、Available to most vegetarians in.Available to lacto-vegetarians an vegans in.Iron meat spinach, prune juice or UU 7 /U/UB12 meat, fish and dairy productsdairy or soy products and UU 8 /U/Uvegetable margarines, soy products and some UU 9 /U/U(分数:4.00)填空项 1:_填空项 1:_填空项 1:_(4).Question 40Complete the s

18、entence below.Write NO MORE THAN THREE WORDS for your answer The website address given for more information about vegetarianism is _.(分数:1.00)填空项 1:_六、BReading Module(总题数:0,分数:0.00)七、BREADING PASSAGE(总题数:3,分数:13.00)COMPUTER SECURITYIt is believed that the problem of computer security has changed ove

19、r a period of time as businesses, through an increased use of information technology (IT), have become more and more dependent on information and the associated information systems (IS). However, at the same time, there has been limited change in the implemented security or safeguards to these infor

20、mation systems. In fact many executives or managers fail to even identify the relevant requirement for security or policies.A. The Internet has been roughly doubling in size every year, and the associated security incidents have been running in parity. Even if the percentage of malicious users is sm

21、all, the increase in size of the Internet and in the number of incidents of failed security is significant. The importance of the growth in the Internet can be highlighted by the fact that in July 1991, 33% of Internet users were from the commercial sector, whereas in July 1996, this figure had rise

22、n to 50%.B. In 1988, the Morris “worm“ was introduced on the Internet to invade, attack and replicate itself on the network. The response was to shut down E-mail and connectivity. However, the “fixes“ were to be distributed via E-mail and so the solution was self-defeating. As a result of this worm

23、virus, CERT (Computer Emergency Response Team) was formed, with the Australian version (AUSCERT) starting in 1992.C. One of the problems with Internet security is the fact that the incidents are increasing in sophistication. One of the reasons for this has been the increasing availability of toolkit

24、s. Although these toolkits are designed to assist computer systems designers to protect and develop their sites, they also allow relatively ignorant intruders to carry out increasingly complex incidents with the utilisation of many routers and disguises to reach their “target“. According to a US Dep

25、artment of Defence report, less than 1% of incidents are identified but 65% of these are successful. Another thing to bear in mind with intruders and hackers is that they do not respect geographical or administrative boundaries, or time zones. They may be geographically dislocated from the point of

26、attack and therefore operating in “off-duty“ hours.D. The thing to remember with security is that the system administrators must get it fight all the time; the intruder must get it right just once. Evidence of this is easy to find. In 1997, a teenager hacked into a Bell Atlantic network. His hacking

27、 crashed the computer and resulted in 600 homes, a regional airport and emergency services being without telephone communications for six hours. And what was the punishment for this offence? Two years of probation, community service and a fine of US$5,000.E. Governments are getting tough on cyber cr

28、imes, especially in the wake of September 11th. These crimes are being linked to national security, which in the US is now of major concern to government officials and the general public alike. And the government has been swift to act. In late 2001, the US Patriot Act was introduced. This Act increa

29、sed the maximum sentence for breaking into a computer from five to ten years. Then in July 2002, the House of Representatives approved the Cyber Security Enhancement Act. Now if a cyber crime results in the death of an individual, the offender could face a life sentence. There has been additional fa

30、ll-out from the September 11th attacks with the FBI and other government security agencies dramatically escalating their monitoring of the Internet. This has pushed some hackers further underground, fearful that what they had previously been doing out of boredom or challenge could now be viewed as a

31、n act of terrorism.F. On the other hand, the events of September 11th have led to some ex-hackers using their extensive knowledge and experience to join forces with security forces to aid the fight against terrorism.G. However, even with the increased threats of punishment, computer viruses and inci

32、dents of hacking continue to be widespread. Long-time security measures which have been utilised by companies and individuals are not fail-safe. One of the more prevalent IS security measures is the use of firewalls, which “filter“ the data entering/leaving the corporate IS. It is true that these fi

33、rewalls have a number of advantages, nevertheless, they should not be seen as a panacea to all IS security woes, merely an enhancement. They can provide a false sense of security and have limited protection from internal attackers. In short, the corporate world needs to realise that computer securit

34、y will be an on-going problem and expense.Questions 1-3Complete the table below with information found in the text.Use NO MORE THAN THREE WORDS OR A NUMBER for each answer. Write your answersin boxes 1-3 on your Answer Sheet. Date Event1996commercial sector constituted UU 1 /U/Uof Internet usageUU 2

35、 /U/UComputer Emergency Response Team formedPost-September 11th 2001FBI increased UU 3 /U/U(分数:3.00)填空项 1:_填空项 1:_填空项 1:_Questions 4-9In Reading Passage 1 there are several sections. Choose the most suitable heading (I-IX) from the box below which best matches the Sections A-G. Write your answers in

36、 boxes 4-9 on your Answer Sheet.NOTE: there are more headings than sections so you will not use all of them. You may use any of the headings more than once.LIST OF HEADINGSI A positive aspect of hackingII Tougher punishments for backersIII Response to Internet securityIV Growth of the InternetV Resp

37、onsibilities of managersVI Hackers vs. administratorsVII Difficulty of detectionVIII Government agenciesIX Common security measure(分数:6.00)(1).Paragraph B _(分数:1.00)填空项 1:_(2).Paragraph C _(分数:1.00)填空项 1:_(3).Paragraph D _(分数:1.00)填空项 1:_(4).Paragraph E _(分数:1.00)填空项 1:_(5).Paragraph F _(分数:1.00)填空项

38、 1:_(6).Paragraph G _(分数:1.00)填空项 1:_Questions 10-13Complete the sentences below.Use NO MORE THAN THREE WORDS for each answer. Write your answers in boxes 10-13 on your Answer Sheet.(分数:4.00)(1).Solving the Morris worm was difficult because the repair method was sent _ and therefore useless.(分数:1.00

39、)填空项 1:_(2).The teenager who hacked into Bell Atlantic would get a maximum prison sentence of _if he committed the same crime now.(分数:1.00)填空项 1:_(3).Some hackers are scared that government authorities could now consider them to be _(分数:1.00)填空项 1:_(4).One disadvantage of _ is that they can make a c

40、ompany feel protected from attack even though the system is not perfect.(分数:1.00)填空项 1:_八、BREADING PASSAGE(总题数:3,分数:14.00)A. The benefit of receiving enough sleep is essential to our inner well-being. Not enough sleep, however, means that we lack the opportunity to restore ourselves physiologically,

41、 emotionally and cognitively. It affects our mood and can result in behaviour and performance problems. When we sleep, our bodies rest but our brains are active. Sleep lays the groundwork for a productive day ahead. Although most people benefit the most from eight hours of sleep each night, this is

42、not always what they manage to achieve. Men get slightly less sleep than women during the week (6.7 hours/night vs. 7.0 hours /night), but have fewer sleep problems, according to recent Sleep in America polls conducted annually by the National Sleep Foundation (NSF).B. According to current scientifi

43、c thought, the human body is pre-programmed for sleep. At nightfall, cells in the retina (a light sensitive membrane connected to the eye by the optic nerve) send a sleep signal to a cluster of nerve cells in the brain. These nerve cells are concentrated together in the suprachiasmatic nucleus (SCN)

44、 and are located in a part of the brain called the hypothalamus which helps regulate body temperature. The SCN is also known as the circadian clock. This biological “clock“ relays the message to other parts of the brain which then signals the body that it is time to sleep. For instance, the pineal g

45、land, also located in the hypothalamus, produces a substance called melatonin, which lowers body temperature, and causes drowsiness.C. A great deal of the information we now know about sleep and the physiological changes it causes in the brain can be traced back to the invention of the electroencephalogram in the 1950s. This machine allowed scientists to record the feeble electric currents generated on the brain without opening the skull and to depict them graphically ont

展开阅读全文
相关资源
猜你喜欢
  • API MPMS 14 4-2017 Manual of Petroleum Measurement Standards Chapter 14-Natural Gas Fluids Measurement Section 4-Converting Mass of Natural Gas Liquids and Vapo.pdf API MPMS 14 4-2017 Manual of Petroleum Measurement Standards Chapter 14-Natural Gas Fluids Measurement Section 4-Converting Mass of Natural Gas Liquids and Vapo.pdf
  • API MPMS 14 5-2009 Calculation of Gross Heating Value Relative Density Compressibility and Theoretical Hydrocarbon Liquid Content for Natural Gas Mixtures for C.pdf API MPMS 14 5-2009 Calculation of Gross Heating Value Relative Density Compressibility and Theoretical Hydrocarbon Liquid Content for Natural Gas Mixtures for C.pdf
  • API MPMS 14 6-1991 Manual of Petroleum Measurement Standards Chapter 14 Natural Gas Fluid Measurement Section 6 Continuous Density Measurement (Second Edition)《.pdf API MPMS 14 6-1991 Manual of Petroleum Measurement Standards Chapter 14 Natural Gas Fluid Measurement Section 6 Continuous Density Measurement (Second Edition)《.pdf
  • API MPMS 14 7-2012 Manual of Petroleum Measurement Standards Chapter 14 7 - Mass Measurement of Natural Gas Liquids (Fourth Edition)《石油计量标准手册 第14 7章 天然气液的质量测量 第.pdf API MPMS 14 7-2012 Manual of Petroleum Measurement Standards Chapter 14 7 - Mass Measurement of Natural Gas Liquids (Fourth Edition)《石油计量标准手册 第14 7章 天然气液的质量测量 第.pdf
  • API MPMS 14 7-2018 Manual of Petroleum Measurement Standards Chapter 14 - Natural Gas Fluids Measurement Section 7 - Mass Measurement of Natural Gas Liquids and.pdf API MPMS 14 7-2018 Manual of Petroleum Measurement Standards Chapter 14 - Natural Gas Fluids Measurement Section 7 - Mass Measurement of Natural Gas Liquids and.pdf
  • API MPMS 14 8-1997 Manual of Petroleum Measurement Standards Chapter 14 Natural Gas Fluids Measurement Section 8 Liquefied Petroleum Gas Measurement (Second Edi.pdf API MPMS 14 8-1997 Manual of Petroleum Measurement Standards Chapter 14 Natural Gas Fluids Measurement Section 8 Liquefied Petroleum Gas Measurement (Second Edi.pdf
  • API MPMS 16 2-1994 Manual of Petroleum Measurement Standards Chapter 16-Measurement of Hydrocarbon Fluids By Weight or Mass Section 2-Mass Measurement of Liquid.pdf API MPMS 16 2-1994 Manual of Petroleum Measurement Standards Chapter 16-Measurement of Hydrocarbon Fluids By Weight or Mass Section 2-Mass Measurement of Liquid.pdf
  • API MPMS 17 1 SPANISH-2008 Manual of Petroleum Measurement Standards Chapter 17 1 Guidelines for Marine Inspection (QUINTA EDICION)《石油勘测标准手册 第17章 海洋勘测 第5版》.pdf API MPMS 17 1 SPANISH-2008 Manual of Petroleum Measurement Standards Chapter 17 1 Guidelines for Marine Inspection (QUINTA EDICION)《石油勘测标准手册 第17章 海洋勘测 第5版》.pdf
  • API MPMS 17 1-2014 Manual of Petroleum Measurement Standards Chapter 17 1 Guidelines for Marine Inspection (Sixth Edition Includes Access to Additional Content).pdf API MPMS 17 1-2014 Manual of Petroleum Measurement Standards Chapter 17 1 Guidelines for Marine Inspection (Sixth Edition Includes Access to Additional Content).pdf
  • 相关搜索

    当前位置:首页 > 考试资料 > 职业资格

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1