1、专业英语八级模拟试卷 681及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture.
2、 When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Computer Crime . Introduction Current situation: the increase in number and type of computer crime . Feat
3、ures of computer criminals A. relatively honest B. gender【 1】 _ 1. most being males 2. females being accomplices C. aged between 14 and【 2】 _ D. bright, eager, highly motivated, adventuresome E.【 3】 _profiles: ranging from young teens to eiders, from black to white, from short to tall . Definitions
4、of computer crimechanging over【 4】 _A. once defined as a form of white-collar crime committed inside a computer systemB. a federal crime defined as hacking into credit and other data bases protected by federal【 5】 _statutesC. unauthorized access to computers to obtain money, goods or services or cla
5、ssified information .【 6】 _of computer crimeA. swindling or stealing of moneye.g. The Well Fargo Bank discovered an employee using the bank computer to embezzle $ 21.3 million.B. credit card【 7】 _e.g. A computer hacker gained illegal access to a credit data base and applied for credit cards to issue
6、 money from ATMs.C.【 8】 _of computer timee.g. Excessive computer game time in business means stealing of work time. . Protection【 9】 _ hardware identification 【 10】 _software disconnecting critical bank applications proper internal controls SECTION B INTERVIEW Directions: In this section you will he
7、ar everything ONCE ONLY. Listen carefully and then answer the questions that follow. Questions 1 to 5 are based on an interview. At the end of the interview you will be given 10 seconds to answer each of the following five questions. Now listen to the interview. 11 Mr. Swift has marked some lines on
8、 the page because _. ( A) he thought Mr. Sun has written the letter well ( B) there is something wrong about the grammer ( C) they can be improved according to western culture ( D) these are not polite ways of expression 12 Which of the following did not occur in the conversation? ( A) The year when
9、 Mr. Sun has graduated. ( B) How Mr. Sun left his school. ( C) The name of the school from which Mr. Sun has graduated. ( D) Mr. Sun s major in the school. 13 According to Mr. Swift ,which is the polite and appropriate way of writing? ( A) To fill the page with beautiful while extraneous expressions
10、. ( B) To make things as easy as possible for your addressee. ( C) To express your thanks or apologies again and again. ( D) All of the above. 14 In the conversation, Mr. Sun said “Maybe I shall forget the whole thing“. What is the exact meaning? ( A) He thinks to write anotehr letter. ( B) He think
11、s to give up writing such a letter. ( C) He thinks to forget all about Mr. Swift s directons. ( D) He thinks to forget all about this unpleasant experience. 15 According to the conversation, an application letter should _. ( A) be a long one with all possible information about the applicant ( B) be
12、a brief one with the purpose of writing made clear ( C) be a brief one with the purpose of writing made clear, together with a resume ( D) all of the above ways are welcome SECTION C NEWS BROADCAST Directions: In this section you will hear everything ONCE ONLY. Listen carefully and then answer the q
13、uestions that follow. At the end of each news item, you will be given 10 seconds to answer the questions. 16 Which of the following is TRUE? ( A) Hosni Mubarak is to have an operation. ( B) Hosni Mubarak refuses to eat anything. ( C) Hosni Mubarak refuses to have solid food. ( D) Hosni Mubarak is to
14、o weak to eat any food. 17 According to the news, opposition supporters are_. ( A) sympathetic about Hosni Mubaraks health ( B) impatient to wait for Hosni Mubarak to stand trial ( C) sceptical about reports on Hosni Mubaraks health ( D) worried about the hospitals skill of treating Mubarak 17 The N
15、ext Web Timothy Berners-Lee might be giving Bill Gates a run for the money, but he passed up his shot at fabulous wealth-intentionallyin 1990. Thats when he decided not to patent the technology used to create the most important software innovation in the final decade of the 20th century: the World W
16、ide Web. Berners-Lee wanted to make the world a richer place, not a mass personal wealth. So he gave his brainchild to us all. Berners-Lee regards todays Web as a rebellious adolescent that can never fulfill his original expectations. By 2005, he hopes to begin replacing it with the Semantic Weba sm
17、art network that will finally understand human languages and make computers virtually as easy to work with as other humans. As imagined by Berners-Lee, the new Web would understand not only the meaning of words and concepts but also the logical relationships among them. That has great potential. Mos
18、t knowledge is built on two pillars: semantics and mathematics. In number processing, computers already outclass people. Machines that are equally skilled at dealing with language and reason wont just help people uncover new insights: they could blaze new trails on their own. Even with a fairly crud
19、e version of this future Web, mining online for valuable pieces of knowledge would no longer force people to go through screen after screen of irrelevant data. Instead, computers would dispatch intelligent agents, or software messengers, to explore Web sites by the thousands and logically pick out j
20、ust whats relevant. That alone would provide a major boost in productivity at work and at home. But theres far more. Software agents could also take on many routine business work, such as helping manufacturers find and negotiate with lowest-cost parts suppliers and handling help-desk questions. The
21、Semantic Web would also be a treasure house of eureka insights. Most inventions and scientific breakthroughs, including todays Web, spring from novel combinations of existing knowledge. The Semantic Web would make it possible to evaluate more combinations overnight than a person could do in a lifeti
22、me. Sure scientists and other people can post ideas on the Web today for others to read. But with machines doing the reading and translating technical terms, related ideas from millions of Web pages could be distilled and summarized. That will lift the ability to assess and integrate information to
23、new heights. The Semantic Web, Berners-Lee predicts, will help more people become more intuitive as well as more analytical. It will foster global collaborations among people with diverse cultural perspectives, so we have a better chance of finding the right solutions to the really big issueslike th
24、e environment and climate warming. 18 Had he wanted, Berners-Lee could have_. ( A) created the most important innovation in the 1990s ( B) accumulated as much personal wealth as Bill Gates ( C) patented the technology of Microsoft software ( D) given his brainchild to us all 19 The Semantic Web will
25、 be superior to todays web in that it _. ( A) surpasses people in processing numbers ( B) fulfills users original expectations ( C) deals with language and reason as well as number ( D) responds like a rebellious adult 20 To search for any information needed on tomorrows Web, one only has to_. ( A)
26、go through screen after screen of irrelevant data ( B) ask the Web to dispatch some messenger to his door ( C) use smart software programs called “agents“ ( D) explore Web sites by the thousands and pick out whats relevant 21 Thanks to the Web of the future,_. ( A) millions of web pages can be trans
27、lated overnight ( B) one can find most inventions and breakthroughs online ( C) software manufacturers can lower the cost of computer parts ( D) scientists using different specialty terms can collaborate much better 22 The most appropriate title for this text is_. ( A) Differences Between Two Webs (
28、 B) The Humanization of Computer Software ( C) A New Solution to World Problems ( D) The Creator and His Next Creation 一、 PART III GENERAL KNOWLEDGE (10 MIN) Directions: There are ten multiple-choice questions in this section. Choose the best answer to each question. 23 The national anthem(s)of Cana
29、da is/are ( A) O Canada. ( B) God Save The Queen. ( C) O Canada and God Save the Queen. ( D) O Canada and the Star Spangled Banner. 24 All of the following words belong to “Broadening“ in semantic change EXCEPT _ ( A) Bird. ( B) Task. ( C) Camp. ( D) Holiday. 25 An aspirated /p/ and an unaspirated /
30、p/ are_of the p phoneme. ( A) morphemes ( B) phones ( C) tagmemes ( D) allophones 26 Which of the following works is NOT written by William Shakespeare? ( A) A Midsummer Nights Dream. ( B) The Tragedy of Macbeth. ( C) Paradise Lost. ( D) The Tempest. 27 The English Renaissance period was an age of _
31、. ( A) poetry and drama ( B) drama and novel ( C) novel and poetry ( D) romance and poetry 28 What is another name for New York? ( A) Big Ben. ( B) Big Port. ( C) Big Apple. ( D) Big Bear. 29 In Britain, popular newspapers are also called_ ( A) tabloids ( B) quality ( C) broadsheets ( D) junk 30 Can
32、ada gained final independence from Britain in ( A) 1774. ( B) 1838. ( C) 1945 ( D) 1982 31 British English is spoken in _. ( A) Great Britain ( B) Australia ( C) New Zealand ( D) A, B, and C 32 Which of the following is NOT Mark Twains works? ( A) The Innocent s Abroad ( B) The Adventures of Tom Saw
33、yer ( C) The Prince and the Pauper ( D) Daisy Miller 二、 PART IV PROOFREADING they are connected with each other and with other cities. The same ideas, or related ones, turn up in different places; the human problems that repeat themselves in life repeat themselves in literature, but with different s
34、olutions according to different writings at different times. Reading can only be fun if you expect it to be. If you concentrate on books somebody tells you “ought“ to read, you probably wont have fun. But if you put down a book you dont like and try another till you find one that means something to
35、you, and then relax with it, you will almost certainly have a good time-and if you become as a result of reading, better, wiser, or more gentle, you wont have suffered during the process. 三、 PART VI WRITING (45 MIN) Directions: Write a composition of about 400 words on the following topic. 36 Interv
36、iew is frequently used by employers as a means to recruit prospective employees. As a result, there have been many arguments for or against the interview as a selection procedure. What is your opinion? Write an essay of about 400 words to state your view. In the first part of your essay you should s
37、tate clearly your main argument, and in the second part you should support your argument with appropriate details. In the last part you should bring what you have written to a natural conclusion or make a summary. You should supply an appropriate title for your essay. Marks will be awarded for conte
38、nt, organization, grammar and appropriateness. Failure to follow the above instructions may result in a loss of marks. 专业英语八级模拟试卷 681答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the importan
39、t points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for no
40、te-taking. 0 【听力原文】 Computer Crime Good morning, todays lecture is the very first of a series of lectures on types of modern crimes, so Id like to discuss the first typecomputer crime right now. As computer crimes are getting more and more rampant, laws must be passed to address the increase in the
41、number and types of those crimes. Over the last twenty years, large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have compute
42、rs at home and at the office. So, who committed computer crimes? Whats the definition of computer crime and what forms does computer crime take on? And what are our protection measures? We shall answer the preceding questions one by one. First, what kinds of people tend to commit computer crimes? Ac
43、cording to experts, computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, although later they are becoming more aggressi
44、ve.(1)Computer Criminals tend to usually be between the ages of 14-30,(2)they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from normal
45、 individuals, but that is not the case. It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path. There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short
46、 to tall. (3) Second, we shall discuss the evolutionary definition of computer crime. Definitions of computer crime have changed over the years as the users and misusers of computers have expanded into new areas.(4)When computers were first introduced into businesses, computer crime was defined simp
47、ly as a form of white-collar crime committed inside a computer system. Congress has been reacting to the outbreak of computer crimes. The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases
48、protected by federal privacy statutes.(5)This bill is generally creating several categories of federal crimes for unauthorized access to computers to obtain money, goods or services or classified information. Third, computer crimes can take on many forms. The first form is swindling or stealing of m
49、oney is one of the most common computer crimes.(6)An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $ 21.3 million, which is the largest U.S. electronic bank fraud on record. The second form is called credit card scams.(7)This is one that fears many people for good reasons. The following story is a real case. A fellow c