[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc

上传人:roleaisle130 文档编号:471856 上传时间:2018-12-01 格式:DOC 页数:16 大小:62KB
下载 相关 举报
[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc_第1页
第1页 / 共16页
[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc_第2页
第2页 / 共16页
[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc_第3页
第3页 / 共16页
[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc_第4页
第4页 / 共16页
[外语类试卷]专业英语八级(科技类听力填空)模拟试卷1及答案与解析.doc_第5页
第5页 / 共16页
点击查看更多>>
资源描述

1、专业英语八级(科技类听力填空)模拟试卷 1及答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You will hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-l

2、ecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to complete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 Internet Privacy With the rapid development of e-commerce, companies are now capable of cultivatin

3、g more (1)_relationships with their customers. It empowers companies to better understand their customerswants and hence they are able to (2)_offerings to the unique needs of individuals. At the same time, this has become a (3)_because the technology involves the extensive collection and use of pers

4、onal data. The use of the cookie technology can help a website assign each individual user a unique identifier, so that he may be recognized in(4)_visits to the site. On each return visit, the site can call up user-specific information, including the consumers (5)_as indicated by documents the consu

5、mer accessed in prior visits. Despite concerns about privacy and security with online shoppers, according to the 1999 survey, still 61% of the subjects surveyed said they were (6)_toward banner ads based on their personal interests rather than random ones. The study seems to (7)_ the e-commerce firm

6、s who are willing to provide customized shopping experiences. Statistics also show that not all the websites post privacy policies. Furthermore, the exact definition of the privacy policies in themselves remains (8)_. Finally, in spite of privacy (9)_, some companies, e.g. AdA still offended custome

7、rs by transferring users information data to another company. To sum up, the (10)_of effective privacy protection is widely believed to be stunting the growth of e-commerce. 10 Blog Culture The topic today is about the newly appearing phenomenon of (1)_. The most significant revolutions of the last

8、twenty years have had something to do with writing: email, webpages, blogs, etc. All this reflects a trend that communication has shifted towards words on a screen. Firstly, what is a blog? Generally speaking, its an online journal comprised of links and postings in reverse chronological order. Blog

9、s cover (2)_topics: commentaries, personal musings, political tracts, updated information, etc. However, a significant number of prominent bloggers have not enabled the comment feature. The most common(3)_of blogs tends to be its voice: blogs are written human passion. There are eight prominent feat

10、ures of bloggers: willingness to share their thoughts and experiences with others; helping each other a lot; global, reading international sources and wanting to meet other people; using (4)_; getting so much used to providing feedback themselves; showing a need for (5)_; investing so much time in t

11、heir blogs; representing the culture of speed. investing so much time in their blogs; representing the culture of speed. Finally, the (6)_of personal blogs is discussed, and the advantages as well as disadvantages to the society will be mentioned. The advantages of blogs include: sharing knowledge a

12、nd information with others; being a positive way of (7)_; showing talents and expertise of the writer; better informing the society and authorities concerned. The disadvantages of blogs are: most people dont have (8)_, or are unable to write in a compelling manner; real expertise laying hidden, and

13、readers can only get (9)_information; easy to start and hard to maintain; they are used as powerful weapons to attack others, and our legal system may be (10)_. 20 Parakey:Sharing Online Becomes Ever Easier Today a recipe isnt passed on at the Thanksgiving table anymore. Its communicated through the

14、 Internet. But grandparents are often too intimidated to do so because sharing online now involves too many steps. Its not just grandparents who arent using the Web as much as they could its everyone. The (1)_is theres no simple, cohesive tool to help people store and share their creations online. C

15、urrently, the mess of the Web leaves us (2) in one big tangle of actions, service-providers, and applications. Our answer is Parakey, which can make it easier for everyone to get their stuff online. It is “a Web (3)_system that can do everything an operating system can do.“ With Parakey, in a typica

16、l “family portal“ , mom has a page with her recipes displayed, dad has his collection of war (4)_, and the kids have their party photos. With digital photos, all you have to do is to plug in your camera, and your photos get (5)_on your computer in such a way that you can view them quickly and easily

17、 through your Parakey site. No more digging through folders for the right image files. Parakey not only (6) and displays your photos attractively but also allows for serious (7)_functions and fun scrapbooking habits! Now lets say you want to share your collection of graduation photos with some selec

18、ted family and friends. They dont have to (8)_before seeing your photo album. You just send them a digital “key“ , which contains a password, and they (9)_the stuff. Drag keys of different colors to different collections, and you open them up to different groups of people. To use Parakey, you first

19、must download a small application, with which to manage your content. Then everything is ultimately stored locally, your computer being (10)_with remote servers whenever you are online. 专业英语八级(科技类听力填空)模拟试卷 1答案与解析 SECTION A MINI-LECTURE Directions: In this section you sill hear a mini-lecture. You wi

20、ll hear the lecture ONCE ONLY. While listening, take notes on the important points. Your notes will not be marked, but you will need them to complete a gap-filling task after the mini-lecture. When the lecture is over, you will be given two minutes to check your notes, and another ten minutes to com

21、plete the gap-filling task on ANSWER SHEET ONE. Use the blank sheet for note-taking. 0 【听力原文】 Internet Privacy Good morning. Todays lecture still focuses on the e-commerce. One of the most important advances in the rapidly developing world of electronic commerce is the ability of companies to develo

22、p personalized relationships with their customers. Personalization empowers companies to better understand their customers wants and desires and improve customer service by tailoring offerings to the unique needs of individuals. At the same time, this has become a subject of hot controversy because

23、the technology involves the extensive collection and use of personal data. Many, if not most, online shoppers and surfers are not aware of the extent of how much and what kind of information can be gathered about a person, even someone who is just visiting and not shopping or signing up for anything

24、. Through the use of the cookie technology, a persons movement through the Web can be tracked to provide information. Using cookies a website assigns each individual a unique identifier, so that he may be recognized in subsequent visits to the site. On each return visit, the site can call up user-sp

25、ecific information, which could include the consumers preferences or interests, as indicated by documents the consumer accessed in prior visits or items the consumer clicke while in the site. Websites can also collect information about consumers through hidden electronic navigational software that c

26、aptures information about site visits, including web pages visited and information downloaded, the types of browser used, and the referring websites Internet addresses. The result is that a website about Janes gardening could sell not only her name to mail-order companies, but also the fact that she

27、 spent a lot of time one Saturday night last month reading about how to fertilize roses. More disturbing scenarios along the same lines could be imagined. However, although concern about privacy and security has long been the biggest issue with online shoppers, some of them may not mind their behavi

28、our being watched if it allows their shopping experience to be customized. According to the 1999 Personalized Marketing and Privacy on the Net: What Consumers Want survey conducted by the non-profit research firm Privacy and American Business, 61 percent of the 474 Internet users surveyed said that

29、they would be positive toward receiving banner ads tailored to their personal interests rather than receiving random ads. This represents about 56 million adult users interested in such personalization. In addition, 68 percent of the users also said that they would provide personal information in or

30、der to receive tailored banner ads, on the condition that notice and opt-out are provided. The study seems to back the e-commerce firms who are watching online behaviour to provide customized shopping experiences, and not privacy advocates who say that this practice is an invasion of privacy. It is

31、the purpose for gathering the information, it would seem, that is the key to drawing the line between acceptable personalization and invasion of privacy. This is why it is important to many shoppers that a site has a privacy policy that explains what information is gathered and how it is being used,

32、 before they relinquish their information. However, according to the 1999 Georgetown Internet Privacy Policy Survey, 94% of the top 100 websites post privacy policies, and 66% of the overall websites post privacy policies. These figures sound reassuring but the exact definition of the privacy polici

33、es in themselves remains to be questioned. The 1998 Federal Trade Commission report on Internet privacy, Privacy Online: A Report to Congress outlined five criteria by which a commercial website can be said to have a truly comprehensive privacy policy. Known as the Fair Information Practice Principl

34、es, they are notice/awareness, choice/consent, access/participation, integrity/security, and enforcement/redress. In other words, websites should notify consumers that theyre collecting personal information and that the consumers can choose whether to provide it. The result of a three-year study of

35、1,400 websites showed only 924 of the 1,400 websites surveyed were found to have privacy policies. 87 percent of these notified customers that they collect information, and 77 percent offered customers refusal rights. However, only 40 percent gave customers access to their information; 46 percent pr

36、omised security; and 49 percent provided contact information. There is also the question of how much these privacy promises are enforced. In June 1998, AdA had transferred user information including log-on names and passwords to the G, an unrelated site. Registered AdA users had no idea that the sit

37、e had done so until they received an e-mail note that welcomed them to the G and contained their AdA passwords. This incident provoked outrage from some AdAge. com users and embarrassed both companies. Although AdA later apologized to its users, explaining that the data transfer was part of a commun

38、ity partnership between the sites and was designd to allow AdA users easy access to the Gs community features, this is a glaring example of what can happen despite privacy promises. To sum up, todays lecture mainly deals with the lack of effective privacy protection which is widely believed to be st

39、unting the growth of e-commerce. Survey after survey has shown that more people would embrace e-commerce if they had better assurances about their privacy. Big businesses and small businesses have to realize that trust is necessary to build long-term, profitable customer relationships. Trust fosters

40、 customer loyalty, referrals and repeat business, so commercial enterprises that make privacy protection a priority will reap the returns from their customers. 【知识模块】 科技类 1 【正确答案】 personalized individualized 【试题解析】 本题为要点题,讲座中提到 One of the most important advances in the rapidly developing world of el

41、ectronic commerce is the ability ofcompanies to develop personalized relationships with their customers,即通过互联网,企业与客户之间建立起了更为个人化、私人化的联系。 【知识模块】 科技类 2 【正确答案】 tailor 【试题解析】 本题为细节题,讲座中提到 improve customer service by tailoring offerings to the unique needs of individuals。 【知识模块】 科技类 3 【正确答案】 hot controver

42、sial subject 【试题解析】 本题为归纳总结题,原文是 become a subject of hot controversy because 这里需要考生根据题意要求做适当修改,压缩到三个词,使之在语法语义上都切合上下文。 【知识模块】 科技类 4 【正确答案】 subsequent next later 【试题解析】 本题为推理题,讲座中提到 cookie技术能帮助记忆网民的个人用户信息,并使该用户接下来访问同一网站时能够立刻被识别出来,也可通过推理,因为 cookie本身就具备记忆功能,所以就可以跟踪网民经常访问的网站。 【知识模块】 科技类 5 【 正确答案】 prefere

43、nces interests likes 【试题解析】 本题为细节题,讲座中提到所谓用户个人信息。即用户的兴趣爱好等个人喜好。 【知识模块】 科技类 6 【正确答案】 positive 【试题解析】 本题为归纳总结题,讲座中列举了一系列的问卷调查, 1999年的调查指出虽然网民们越来越关注网络隐私安全问题,但仍有 6l的网民认为与那些随意散布的广告相比他们更愿意接收个人化的网络广告,这就说明他们的态度是正面的。 【知识模块】 科技类 7 【正确答案】 back support 【试题解析】 本题为细节题,讲座中提到 1999年的这项调查显然支持电子商务公司收集客户信息并提供相应的用户化商务服务

44、。 【知识模块】 科技类 8 【正确答案】 to be questioned questionable doubtful uncertain 【试题解析】 本题为细节题,讲座中同时指出 These figures sound reassuring but the exact definition of the privacy policies in themselves remains to be questioned虽然网络隐私安全问题日益成为大家关注的问题,但并非所有网址都提供隐私保护条例,而且对隐私政策的定义依然是模糊不清的、有争议的。 【知识模块】 科技类 9 【正确答案】 promi

45、ses 【试题解析】 本题为细节题,讲座中提到 AdAge com公司把自己的客户私人信息转让给 Globe com公司,侵犯了客户的隐私权,引起轩然大波,说明原来的隐私保护承诺并未真正被信守。 【知识模块】 科技类 10 【正确答案】 lack shortage 【试题解析】 本题为要点题,讲座中最后提到缺少有效的隐私保护,这是现存的电子商务发展的最大的绊脚石。 【知识模块】 科技类 10 【听力原文】 Blog Culture Good morning, today Id like to discuss with you the phenomenon of blog. Isnt it in

46、teresting that some of the most significant “revolutions“ of the last twenty years have all had to do with writing? First we had email, then webpages, then mobile phone texting, and now blogs. All this reflects a trend that the world is becoming more formal in how it communicates. Instead of body la

47、nguage and endless conversations, communication has shifted towards endless words on a screen. Firstly, what is a blog, anyway? Generally speaking, its an online journal comprised of links and postings in reverse chronological order, meaning the most recent posting appears at the top of the page. Bl

48、ogs run the gamut of topics. One may be a running commentary on current events in a specific arena, a series of personal musings, a purely political tract, pointers to other peoples work or products, or it may be a constantly updated “whats new“ by a domain expert. While some blogging software permits readers to post their own comments, this feature has to be turned on by the blogger, and a significant number of prominent bloggers have not enabled the comment feature. What the best individual blogs tend to have in common is voice they are cle

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 外语考试

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1