1、大学英语四级改革适用(阅读)模拟试卷 76及答案与解析 Section B 0 Sandy s Story A)Sandy, a polite and friendly forty-year-old woman with a soft Southern accent, loves cats and frequented the newsgroup rec. pets. cats. B)In 1993 a gang of people from several newsgroups, alt. tasteless, alt. Syntax. Tactical and alt. bigfoot,
2、“invaded“ the rec. pets. Cats. Newsgroup. By the time the invasion had ended, Sandy had received death threats, hate mails and harassing phone calls. Having her email monitored at work, she had almost lost her job. C)The incident began when one of the invaders who joined her newsgroup posted a messa
3、ge asking if he could get help destroying his girlfriend s cat. He said the cat was bothering him, but he didnt want the girlfriend to find out if he killed it. When he began discussing poison and drowning as options, Sandy spoke up. D)First she sent email urging him not to kill the cat. But if he i
4、nsisted, to have it “put to sleep“ humanely. When the email didnt help, Sandy became concerned, then terrified for the cat. She had nightmares. Eventually she wrote a letter to the police that was subsequently distributed on the Internet. E)The flame war explored. The request for help in killing the
5、 cat was actually a fake. The poster and his friends had purposefully chosen a quiet little newsgroup to start a flame war of mythic proportions. Their stated goal was to inflame the members of the group with their posts. And it worked. But when Sandy contacted the police, the invaders became ugly a
6、nd turned their attention to her. F)Soon Sandy found herself on the member list of a Net. Invaderz FAQ(Frequently Asked Questions document)that was being passed around Usenet and even several computer conventions. Rather than being a victim, Sandy was singled out as one of the victimizers. “Those of
7、 us that opposed the group coming in and invading us(were added to the list),“she said. “It was spammed all over the network as a true document with our names on it.“ G)Sandy was disturbed but tried to ignore the problems as much as possible until she found herself under investigation by her own com
8、pany. An irate “U.S. taxpayer“ had written to her employer complaining that she didnt want the Internet used for actions such as those described in the Net. Invaderz document. “Im a twenty-two year employee in this company, with a good reputation which is now in the pooper because of this,“ she said
9、. H)Sandy hasnt prosecuted but the incident exhausted her and made her fearful. She no longer participates in or even reads rec. pets. Cats.; concerned friends email her posts of interest privately. She cannot afford her own home computer, so she can only access the Internet through work, where her
10、supervisor now watches her every move. I)Because she acted(in this case alerting the authorities to what she believed to be cruelty to animals), Sandy became the target of a vicious attack launched by a group of people she has never even met. J)In part, the wars going on in cyberspace are cultural w
11、ars. Who is to decide what is polite and acceptable? Some time ago, I talked with one of the founders of alt. syntax. Tactical, who calls himself Antebi. His responses to those who suggest his tactics are uncivilized “Learn to use killfiles,“ he says. “Grow up, welcome to reality.“ K)After talking w
12、ith him, I understood his group to be somewhat like an Internet fraternity, a bunch of young men who like to do virtual “panty raids“ on unsuspecting newsgroups. The young people themselves arent the problem(I do not think alt. Syntax, tactical was responsible for the death threats to Sandy), but th
13、at kind of mischievous mentality, coupled with a lot of free time, means that certain people can abuse their power in the virtual world. L)But should the virtual world be one where war is the only metaphor? An invading army swept through Sandys village, and when she reached out to protect someone el
14、se, they turned their sights on her. She was attacked, accused, harassed and threatened with no possible resource. The army captain merely says she should have armed herself. But perhaps there are other ways to live than by the rule of the strongest? Isn t that what civilization is supposed to be ab
15、out? 1 At the beginning of the incident, one of the invaders wanted Sandy to kill his girlfriend s cat. 2 On the member list, Sandy found herself a victimizer. 3 The invasion in 1993 almost made Sandy lose her job. 4 Exhaustion and fear prevented Sandy from participating in rec. pets. cats. 5 To som
16、e degree, the wars in cyberspace are mostly related to culture. 6 The message posted was fake, whose purpose was to irritate the members of the group. 7 When Sandy trying protecting someone else, she was noticed and attacked. 8 Mischievous mentality indulges certain people with abuse of their power
17、in the virtual world. 9 When Sandy found herself under investigation by her own company, she was irritated. 10 Sandy wrote to the police when she failed to persuade him not to kill the cat. 10 Preparing for Computer Disasters Summary A)When home office computers go down, many small businesses grind
18、to a halt. Fortunately, taking steps to recover from disasters and minimizing their effects is quite straightforward. B)Fires, power surges, and floods, theyre all facts of life. We read about them in the morning paper and see them on the evening news. We sympathize with the victims and commiserate
19、over their bad luck. We also shake our heads at the digital consequencesmelted computers, system failures, destroyed data. Yet, somehow, many of us continue to live by that old mantra of denial: “It wont happen to me.“ Well, the truth is, at some point youll probably have to deal with at least one d
20、isaster. That s just how it goes, and in most aspects of our lives we do something about it. We buy insurance. We stow away provisions. We even make disaster plans and run drills. But for some reason, computer disaster recovery is a blind spot for many of us. It shouldnt be. Home computers contain s
21、ome of our most important information, both business and personal, and making certain our data survives a disaster should be a priority. Moreover, even the smallest disaster can be a serious disruption. Personal computers have become an integral part of the smooth-running household. We use them to c
22、ommunicate, shop, and do homework, and theyre even more vital to home office users. When home office computers go down, many small businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimize their effects is quite straightforward. With a good offsite storage plan and
23、 the right tools, you can bounce back quickly and easily from minor computer disasters. And, should a major calamity strike, you can rest assured your data is safe. Offsite Storage: Major Disasters C)House fires and floods are among the most devastating causes of personal computer destruction. That
24、s why a solid offsite backup and recovery plan is essential. Although many home users faithfully back up their hard drives, many would still lose all their data should their house flood our burn. That s because they keep their backups in relatively close to their computers. Their backup disks might
25、not be in the same room as their computers tucked away in a closet or even the garage but theyre not nearly far enough away should a serious disaster strike. So, it s important to back up your system to a removable medium and to store it elsewhere. D)There are many ways to approach offsite storage.
26、It starts with choice of backup tools and storage medium. Disaster situations are stressful, and your recovery tools shouldnt add to that stress. They must be dependable and intuitive, making it easy to schedule regular backups and to retrieve files in a pinch. They must also be compatible with your
27、 choice of backup medium. Depending on your tools, you can back up to a variety of durable disk types from CDs to Jaz drives to remote network servers. Although many of these storage media have high capacity, a backup tool with compression capabilities is a big plus, eliminating the inconvenience of
28、 multiple disks or large uploads. E)Once you select your tools and a suitable medium, you need to find a remote place to store your backups. The options are endless. However, no matter where you choose, be sure the site is secure, easily accessible, and a good distance away from your home. You may a
29、lso want to consider using an Internet-based backup service. More and more service providers are offering storage space on their servers, and uploading files to a remote location has become an attractive alternative to conventional offsite storage. Of course, before using one of these services, make
30、 certain you completely trust the service provider and its security methods. Whatever you do, schedule backups regularly and store them far away from your home. Come What May: Handling the Garden Variety Computer Crisis F)Not all home computer damage results from physical disaster. Many less menacin
31、g problems can also hobble your PC or destroy your information. Systems crash, kids “rearrange“ data, adults inadvertently delete files. Although these events might not seem calamitous, they can have serious implications. So, once again, it s important to be prepared. As with physical disasters, reg
32、ular backups are essential. However, some of these smaller issues require a response thats more nuanced than wholesale backup and restoration. To deal with less-than-total disaster, your tool set must be both powerful and agile. For example, when a small number of files are compromised, you may want
33、 to retrieve those files alone. Meanwhile, if just your settings are affected, youll want a simple way to roll back to your preferred setup. Yet, should your operating system fail, youll need a way to boot your computer and perform large-scale recovery. Computer crises come in all shapes and sizes,
34、and your backup and recovery tools must be flexible enough to meet each challenge. The Right Tools for the Right Job: Gearing up for Disaster G)When disaster strikes, the quality of your backup tools can make the difference between utter frustration and peace of mind. Symantec understands this and o
35、ffers a range of top quality backup and recovery solutions. Norton GoBack is the perfect tool for random system crashes, failed installations, and inadvertent deletions. With this powerful and convenient solution, its simple to retrieve overwritten files or to bring your system back to its pre-crash
36、 state. Norton Ghost is a time-tested home office solution. Equipped to handle full-scale backups, its also handy for cloning hard drives and facilitating system upgrades. A favorite choice for IT professionals, its the ideal tool for the burgeoning home office. You can buy Norton Ghost and Norton G
37、oBack separately, or get them both when you purchase Norton System Works. H)Lifes disasters, large and small, often catch us by surprise. However, with a little planning and the right tools, you can reduce those disasters to bumps in the road. So, dont wait another day. Buy a good set of disaster re
38、covery tools, set up an automatic backup schedule, and perform a dry run every now and again. Then, rest easy. 11 It s necessary for us to back up our systems to some transferable medium and to put it somewhere else. 12 Not all damage of your computer caused by physical disaster. 13 The quality of y
39、our backup tools determines whether you are frustrated or have a peaceful mind when disaster strikes. 14 For some reason, computer disaster recovery is always ignored by many of us. 15 Taking steps to recover from computer disasters can minimize bad effects. 16 House fires and floods are the most de
40、vastating causes of personal computer destruction. 17 With a good offsite storage plan and the right tools, you can bounce back quickly in minor computer disasters. 18 Preparation for computer disasters should do from time to time. 19 Backup and recovery tools must be flexible enough to deal with va
41、rious computer crises. 20 You should find a distant place to store your backups after selecting your tools and a suitable medium. 20 Why Drug Testing Is Needed A)The illicit drug trade in America has fast become a $110 billion annual business. According to the Research Triangle Institute, A North Ca
42、rolina-based research organization, drug abuse cost the U.S. economy $ 60 billion in 1983, nearly a 30 percent increase from the more than $ 47 billion estimated for 1980. B)No one seriously disputes that drug abuse in the workplace is a serious and growing problem for both public and private employ
43、ers. Increasingly, the problem continues to contribute to the high rate of employee absenteeism, rising health care costs, a high rate of accidents, and the low productivity of our work force. It has been aptly called an American tragedy. C)The possibility of protests within certain shops also exist
44、s. Job actions not for more pay but to be a free citizen at work could put some heat on certain company officials. D)Take the Los Angeles Times. Its editorial page has been among the most forceful and lucid in the nation in fighting to keep the Bill of Rights in working order. Yet, according to Dani
45、el Jussim, writing in the ACLU s Civil Liberties newsletter, The “Los Angeles Times, though its director of employee relations says there s no particular drug problem at his newspaper, recently adopted a mandatory urinalysis program to stay current with what other employers are doing.“ E)Imagine the
46、 impact in Los Angeles if Anthony Day, the civil libertarian who is editor of the Los Angeles Times editorial page, were to lead a picket line outside the paper with such signs as: JAMES OTIS, FATHER OF THE FOURTH AMENDMENT, FOUGHT BRITISH GENERAL SEARCH WARRANTS ON BEHALF OF WORKING PEOPLE NOT JUST
47、 PUBLISHERS. F)The need for alliances to preserve whats left of privacy grows greater by the day. Charles Seabrook writes of new tests that can “detect the presence of the abnormal levels of chemicals found in patients with severe depression, schizophrenia, and manic-depression . that can detect che
48、mical markers that may mean a person is at high risk of developing diabetes, arthritis, or cancer. That can screen for more than 150 genetic disease, including sickle cell anemia. and cystic fibrosis.“ G)Would an employer hire someone who is at risk of developing cancer? Should an employer have acce
49、ss to such private information? H)On a more modest level, a new test developed by Werner Baumgartner, a Los Angeles chemist, bypasses such old-time procedures as requiring the random suspect to urinate into a cup or bottle. The new test uses radiation on hair and discloses not only what drugs have been taken but when they were taken, something urinalysis can t do. I)As for coming attractions that verify the prescience of George Orwell, The Washington Post reported in mid-1984, “Researchers in academia and indus