[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc

上传人:livefirmly316 文档编号:470598 上传时间:2018-12-01 格式:DOC 页数:22 大小:83KB
下载 相关 举报
[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc_第1页
第1页 / 共22页
[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc_第2页
第2页 / 共22页
[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc_第3页
第3页 / 共22页
[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc_第4页
第4页 / 共22页
[外语类试卷]专业英语八级模拟试卷681及答案与解析.doc_第5页
第5页 / 共22页
点击查看更多>>
资源描述

1、专业英语八级模拟试卷 681及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.

2、 When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Computer Crime . Introduction Current situation: the increase in number and type of computer crime . Feat

3、ures of computer criminals A. relatively honest B. gender【 1】 _ 1. most being males 2. females being accomplices C. aged between 14 and【 2】 _ D. bright, eager, highly motivated, adventuresome E.【 3】 _profiles: ranging from young teens to eiders, from black to white, from short to tall . Definitions

4、of computer crimechanging over【 4】 _A. once defined as a form of white-collar crime committed inside a computer systemB. a federal crime defined as hacking into credit and other data bases protected by federal【 5】 _statutesC. unauthorized access to computers to obtain money, goods or services or cla

5、ssified information .【 6】 _of computer crimeA. swindling or stealing of moneye.g. The Well Fargo Bank discovered an employee using the bank computer to embezzle $ 21.3 million.B. credit card【 7】 _e.g. A computer hacker gained illegal access to a credit data base and applied for credit cards to issue

6、 money from ATMs.C.【 8】 _of computer timee.g. Excessive computer game time in business means stealing of work time. . Protection【 9】 _ hardware identification 【 10】 _software disconnecting critical bank applications proper internal controls SECTION B INTERVIEW Directions: In this section you will he

7、ar everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions. Now listen to the interview. 11 Mr. Swift has marked some lines on

8、 the page because _. ( A) he thought Mr. Sun has written the letter well ( B) there is something wrong about the grammer ( C) they can be improved according to western culture ( D) these are not polite ways of expression 12 Which of the following did not occur in the conversation? ( A) The year when

9、 Mr. Sun has graduated. ( B) How Mr. Sun left his school. ( C) The name of the school from which Mr. Sun has graduated. ( D) Mr. Sun s major in the school. 13 According to Mr. Swift ,which is the polite and appropriate way of writing? ( A) To fill the page with beautiful while extraneous expressions

10、. ( B) To make things as easy as possible for your addressee. ( C) To express your thanks or apologies again and again. ( D) All of the above. 14 In the conversation, Mr. Sun said “Maybe I shall forget the whole thing“. What is the exact meaning? ( A) He thinks to write anotehr letter. ( B) He think

11、s to give up writing such a letter. ( C) He thinks to forget all about Mr. Swift s directons. ( D) He thinks to forget all about this unpleasant experience. 15 According to the conversation, an application letter should _. ( A) be a long one with all possible information about the applicant ( B) be

12、a brief one with the purpose of writing made clear ( C) be a brief one with the purpose of writing made clear, together with a resume ( D) all of the above ways are welcome SECTION C NEWS BROADCAST Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the q

13、uestions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 Which of the following is TRUE? ( A) Hosni Mubarak is to have an operation. ( B) Hosni Mubarak refuses to eat anything. ( C) Hosni Mubarak refuses to have solid food. ( D) Hosni Mubarak is to

14、o weak to eat any food. 17 According to the news, opposition supporters are_. ( A) sympathetic about Hosni Mubaraks health ( B) impatient to wait for Hosni Mubarak to stand trial ( C) sceptical about reports on Hosni Mubaraks health ( D) worried about the hospitals skill of treating Mubarak 17 The N

15、ext Web Timothy Berners-Lee might be giving Bill Gates a run for the money, but he passed up his shot at fabulous wealth-intentionallyin 1990. Thats when he decided not to patent the technology used to create the most important software innovation in the final decade of the 20th century: the World W

16、ide Web. Berners-Lee wanted to make the world a richer place, not a mass personal wealth. So he gave his brainchild to us all. Berners-Lee regards todays Web as a rebellious adolescent that can never fulfill his original expectations. By 2005, he hopes to begin replacing it with the Semantic Weba sm

17、art network that will finally understand human languages and make computers virtually as easy to work with as other humans. As imagined by Berners-Lee, the new Web would understand not only the meaning of words and concepts but also the logical relationships among them. That has great potential. Mos

18、t knowledge is built on two pillars: semantics and mathematics. In number processing, computers already outclass people. Machines that are equally skilled at dealing with language and reason wont just help people uncover new insights: they could blaze new trails on their own. Even with a fairly crud

19、e version of this future Web, mining online for valuable pieces of knowledge would no longer force people to go through screen after screen of irrelevant data. Instead, computers would dispatch intelligent agents, or software messengers, to explore Web sites by the thousands and logically pick out j

20、ust whats relevant. That alone would provide a major boost in productivity at work and at home. But theres far more. Software agents could also take on many routine business work, such as helping manufacturers find and negotiate with lowest-cost parts suppliers and handling help-desk questions. The

21、Semantic Web would also be a treasure house of eureka insights. Most inventions and scientific breakthroughs, including todays Web, spring from novel combinations of existing knowledge. The Semantic Web would make it possible to evaluate more combinations overnight than a person could do in a lifeti

22、me. Sure scientists and other people can post ideas on the Web today for others to read. But with machines doing the reading and translating technical terms, related ideas from millions of Web pages could be distilled and summarized. That will lift the ability to assess and integrate information to

23、new heights. The Semantic Web, Berners-Lee predicts, will help more people become more intuitive as well as more analytical. It will foster global collaborations among people with diverse cultural perspectives, so we have a better chance of finding the right solutions to the really big issueslike th

24、e environment and climate warming. 18 Had he wanted, Berners-Lee could have_. ( A) created the most important innovation in the 1990s ( B) accumulated as much personal wealth as Bill Gates ( C) patented the technology of Microsoft software ( D) given his brainchild to us all 19 The Semantic Web will

25、 be superior to todays web in that it _. ( A) surpasses people in processing numbers ( B) fulfills users original expectations ( C) deals with language and reason as well as number ( D) responds like a rebellious adult 20 To search for any information needed on tomorrows Web, one only has to_. ( A)

26、go through screen after screen of irrelevant data ( B) ask the Web to dispatch some messenger to his door ( C) use smart software programs called “agents“ ( D) explore Web sites by the thousands and pick out whats relevant 21 Thanks to the Web of the future,_. ( A) millions of web pages can be trans

27、lated overnight ( B) one can find most inventions and breakthroughs online ( C) software manufacturers can lower the cost of computer parts ( D) scientists using different specialty terms can collaborate much better 22 The most appropriate title for this text is_. ( A) Differences Between Two Webs (

28、 B) The Humanization of Computer Software ( C) A New Solution to World Problems ( D) The Creator and His Next Creation 一、 PART III GENERAL KNOWLEDGE (10 MIN) Directions: There are ten multiple-choice questions in this section. Choose the best answer to each question. 23 The national anthem(s)of Cana

29、da is/are ( A) O Canada. ( B) God Save The Queen. ( C) O Canada and God Save the Queen. ( D) O Canada and the Star Spangled Banner. 24 All of the following words belong to “Broadening“ in semantic change EXCEPT _ ( A) Bird. ( B) Task. ( C) Camp. ( D) Holiday. 25 An aspirated /p/ and an unaspirated /

30、p/ are_of the p phoneme. ( A) morphemes ( B) phones ( C) tagmemes ( D) allophones 26 Which of the following works is NOT written by William Shakespeare? ( A) A Midsummer Nights Dream. ( B) The Tragedy of Macbeth. ( C) Paradise Lost. ( D) The Tempest. 27 The English Renaissance period was an age of _

31、. ( A) poetry and drama ( B) drama and novel ( C) novel and poetry ( D) romance and poetry 28 What is another name for New York? ( A) Big Ben. ( B) Big Port. ( C) Big Apple. ( D) Big Bear. 29 In Britain, popular newspapers are also called_ ( A) tabloids ( B) quality ( C) broadsheets ( D) junk 30 Can

32、ada gained final independence from Britain in ( A) 1774. ( B) 1838. ( C) 1945 ( D) 1982 31 British English is spoken in _. ( A) Great Britain ( B) Australia ( C) New Zealand ( D) A, B, and C 32 Which of the following is NOT Mark Twains works? ( A) The Innocent s Abroad ( B) The Adventures of Tom Saw

33、yer ( C) The Prince and the Pauper ( D) Daisy Miller 二、 PART IV PROOFREADING they are connected with each other and with other cities. The same ideas, or related ones, turn up in different places; the human problems that repeat themselves in life repeat themselves in literature, but with different s

34、olutions according to different writings at different times. Reading can only be fun if you expect it to be. If you concentrate on books somebody tells you “ought“ to read, you probably wont have fun. But if you put down a book you dont like and try another till you find one that means something to

35、you, and then relax with it, you will almost certainly have a good time-and if you become as a result of reading, better, wiser, or more gentle, you wont have suffered during the process. 三、 PART VI WRITING (45 MIN) Directions: Write a composition of about 400 words on the following topic. 36 Interv

36、iew is frequently used by employers as a means to recruit prospective employees. As a result, there have been many arguments for or against the interview as a selection procedure. What is your opinion? Write an essay of about 400 words to state your view. In the first part of your essay you should s

37、tate clearly your main argument, and in the second part you should support your argument with appropriate details. In the last part you should bring what you have written to a natural conclusion or make a summary. You should supply an appropriate title for your essay. Marks will be awarded for conte

38、nt, organization, grammar and appropriateness. Failure to follow the above instructions may result in a loss of marks. 专业英语八级模拟试卷 681答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the importan

39、t points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for no

40、te-taking. 0 【听力原文】 Computer Crime Good morning, todays lecture is the very first of a series of lectures on types of modern crimes, so Id like to discuss the first typecomputer crime right now. As computer crimes are getting more and more rampant, laws must be passed to address the increase in the

41、number and types of those crimes. Over the last twenty years, large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have compute

42、rs at home and at the office. So, who committed computer crimes? Whats the definition of computer crime and what forms does computer crime take on? And what are our protection measures? We shall answer the preceding questions one by one. First, what kinds of people tend to commit computer crimes? Ac

43、cording to experts, computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, although later they are becoming more aggressi

44、ve.(1)Computer Criminals tend to usually be between the ages of 14-30,(2)they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from normal

45、 individuals, but that is not the case. It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path. There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short

46、 to tall. (3) Second, we shall discuss the evolutionary definition of computer crime. Definitions of computer crime have changed over the years as the users and misusers of computers have expanded into new areas.(4)When computers were first introduced into businesses, computer crime was defined simp

47、ly as a form of white-collar crime committed inside a computer system. Congress has been reacting to the outbreak of computer crimes. The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases

48、protected by federal privacy statutes.(5)This bill is generally creating several categories of federal crimes for unauthorized access to computers to obtain money, goods or services or classified information. Third, computer crimes can take on many forms. The first form is swindling or stealing of m

49、oney is one of the most common computer crimes.(6)An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $ 21.3 million, which is the largest U.S. electronic bank fraud on record. The second form is called credit card scams.(7)This is one that fears many people for good reasons. The following story is a real case. A fellow c

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 外语考试

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1