[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc

上传人:eastlab115 文档编号:483903 上传时间:2018-11-30 格式:DOC 页数:29 大小:96.50KB
下载 相关 举报
[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc_第1页
第1页 / 共29页
[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc_第2页
第2页 / 共29页
[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc_第3页
第3页 / 共29页
[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc_第4页
第4页 / 共29页
[外语类试卷]大学英语四级(2013年12月考试改革适用)模拟试卷262及答案与解析.doc_第5页
第5页 / 共29页
点击查看更多>>
资源描述

1、大学英语四级( 2013年 12月考试改革适用)模拟试卷 262及答案与解析 一、 Part I Writing 1 For this part, you are allowed SO minutes to write a short essay entitled Should Smoking Be Banned in Public Places? You should write at least 120 words but no more than 180 words following the outline given below. Write your essay on Answer

2、 Sheet 1. 1近年来越来越多的公共场所禁烟 2这项举措在受到拥护的同时也引发了争议 3我的看法 Should Smoking Be Banned in Public Places? Section A ( A) To probe into CIA territory. ( B) To gather military intelligence. ( C) To rival the CIA ( D) To bend the law. ( A) Supportive. ( B) Indifferent. ( C) Negative. ( D) Worried. ( A) He learned

3、 to use gun at the age of 21. ( B) He wrote a lot of books about his brief life. ( C) He was considered as a murderer rather than a hero. ( D) The number of victims killed by him was uncertain. ( A) He has been dead for 130 years. ( B) He was an infamous criminal. ( C) His life was full of romantici

4、sm. ( D) The evidence didnt support the pardon. ( A) Vegetarians may have higher risk on heart attack. ( B) People should eat less meat to protect the environment. ( C) Processed meat and red meat may cause cancer. ( D) Meat industry is banned to produce processed meat. ( A) It will probably cause h

5、eart disease. ( B) It is the symbol of European lifestyle. ( C) It is not as delicious as red meat. ( D) It is difficult to produce. ( A) The industry is causing climate change. ( B) Vegetarians are healthier than meat eaters. ( C) Hamburgers are no long popular among people. ( D) People are more li

6、kely to develop heart disease now. Section B ( A) At a bookstore. ( B) At a library. ( C) On the telephone. ( D) At the student center. ( A) By applying from the department. ( B) By lending journals and magazines. ( C) By applying at the loan office. ( D) By using his student ID. card. ( A) Return i

7、t as quickly as possible. ( B) Pay a fine because of the delayed return. ( C) Return it within 7 days of the recall notice. ( D) Return it within 7 days before the due date. ( A) Send an email to him. ( B) Impose an overdue fine on him. ( C) Ask his roommates to give him a message. ( D) Give the not

8、ice to his teacher of his department ( A) Poetry is popular among the general public. ( B) People there have no interest in poetry. ( C) Poetry is the most popular literature. ( D) People have no passion for writing poems. ( A) Flowery words are the most shining point of poetry. ( B) Flowery words a

9、rent an absolute necessity for poetry. ( C) One can write poems easily after he has read much. ( D) He prefers a long novel to a short poem. ( A) He has more readers than other poets. ( B) He uses refined words in his poems. ( C) His poems express deep thoughts. ( D) His poems are interesting and ex

10、cellent. ( A) Finding out a rhymed word with panda. ( B) Bringing the poem about panda to an end. ( C) Adding the name “Amanda“ into a poem. ( D) Replacing panda with another word. Section C ( A) Babies begin to learn at 5 or 6 months old. ( B) Babies begin to learn when theyre bom. ( C) Babies dont

11、 like to be taught by strangers. ( D) Babies always want to learn new things. ( A) To help all the weak children and women. ( B) To study the genes of babies and mothers. ( C) To find out what affects healthy development in people. ( D) To study why babies are influenced by their environment. ( A) S

12、he will clap. ( B) She will blink. ( C) She will smile. ( D) She will imitate her mother. ( A) Unborn babies can remember sounds. ( B) Unborn babies learn how to smile. ( C) Unborn babies can learn to connect with people. ( D) Unborn babies are active to learn things. ( A) They didnt like to do hous

13、ework. ( B) Their efforts were unnoticed by the woman. ( C) They were very tired after a whole days work. ( D) They wanted to share the housework with women. ( A) Cleaning the washroom. ( B) Carrying shopping bags. ( C) Taking out the rubbish. ( D) Changing the bed sheets. ( A) 4.7 hours. ( B) 6.9 h

14、ours. ( C) 5.1 hours. ( D) 1.5 hours. ( A) They can be good if they happen in summer. ( B) They occur only in South China sea. ( C) They can usually be seen around the Pacific Ocean. ( D) They happen in spring most often. ( A) When the warmer air meets with the cooler air. ( B) When the wind moves f

15、aster than 30 meters a second. ( C) When the seawater evaporates into the air. ( D) When the air gets warmer and warmer. ( A) It is the most active part of a typhoon. ( B) It moves faster than 40 meters a second. ( C) It is right in the middle of a typhoon. ( D) It is the most dangerous part of a ty

16、phoon. Section A 26 Could the reason for the worlds economic misfortunes all come down to finger length? Although certainly an oversimplification of our【 C1】 _troubles, scientists have shown that financial traders who lose the biggest dollars are more【 C2】 _to have shorter ring fingers than index fi

17、ngers. Former Wall Street trader and scientist John Coates of the University of Cambridge wondered whether finger ratio really correlated with trader success. His team【 C3】_that traders with the lowest index-to-ring-finger ratios made the most money over a 20-month period, even when the researchers

18、controlled for years of experience. They averaged the【 C4】 _of $1,232,590, nearly six times more than that of men with【 C5】 _ratios. “I almost fell off my chair,“ says Coates. “I could not believe what I was seeing.“ Tim Harford, a columnist for the Financial Times and author of The Logic of Life: T

19、he Rational Economics of an Irrational World, calls the study “fascinating.“ He says hes glad to see that economists have【 C6】 _looking at financial markets in terms of natural【 C7】 _instead of looking at them in terms of rational people making rational decisions. Coates,【 C8】 _, says it is importan

20、t to note that this study【 C9】 _on only one type of trading, and increased confidence and quick reactions may in fact be an obstacle to those trading over long periods of time, like investors at hedge funds and investment banks. “Each【 C10】 _of trading may require a different set of traits,“ he says

21、. A)focuses E)strengthens I)high M)moreover B)started F)likely J)conventional N)selection C)however G)equivalent K)found O)current D)figure H)style L)studied 27 【 C1】 28 【 C2】 29 【 C3】 30 【 C4】 31 【 C5】 32 【 C6】 33 【 C7】 34 【 C8】 35 【 C9】 36 【 C10】 Section B 36 18-to24-year-olds Most at Risk for ID

22、Theft ARyan Thomas, an airman in the Air Force Honor Guard, bought some DVDs on the Internet using his cash card. It was a $20 payment made from his account, which had about $900. But the following day, his account balance was zero. Someone had stolen his account information and bought computer game

23、s and other items. “I didnt know better about securing your information on the computer,“ said Thomas. After the incident, Thomas took a class about how to protect information in cyberspace. But last month, he was hit again, this time by someone who targeted his account from Malaysia. Similar identi

24、ty-theft cases are rising sharply across the country, as young peoplesometimes careless about their personal informationare hit the hardest, according to a survey released last month. BIdentity fraud can include stealing a credit card number or opening a bank account in someone elses name. Thieves g

25、enerally cross state lines in the commission of their crimes and are often linked to rings overseas in places such as Russia and Spain. The young people, ages 18 to 24, is at the greatest risk because it takes them longer to figure out that they have been defraudedmeaning their information is compro

26、mised for a longer period, according to the survey, which is a typical scene of the identity fraud landscape from last year. C“The young people dont protect enough or detect enough,“ said James Van Dyke, president of Javelin Strategy & Research, a California-based company that examined where identit

27、y theft threats are coming from and what effects they are having on consumers. It takes young people an average of 132 days to detect fraud activity on their credit cards, bank accounts and other personal holdings, and those in older age groups average 49 days, the survey shows. When their identitie

28、s are stolen, the young people are victimized by thieves for an average of about five months. D“The 18-to-24 group is unique. Theyre going to college. Theyre away from home for the first time. Theyre sharing more information. More of their information is exposed,“ Van Dyke said. “The old stereotype

29、is true that people are sharing information willingly or unwillingly and are waiting until they become a victim to listen to sound advice.“ Thieves stole $400 from law student Gregory Peltz after he opened a tab at an Ohio dive bar, giving the waiter his cash card for the evening as he rang up drink

30、s. He was shocked when his bank called him days later and told him that someone had withdrawn cash from the account, even without the card. “I felt clueless,“ said Peltz. He said he would have no problem handing over his cash card again for a night out at a barjust not the same dive as last time. EL

31、ast year, there were an estimated 11.1 million identity fraud victims of all ages, a 12 percent increase from the year before, according to the survey. Thieves stole about $54 billion from them, according to the study, which surveyed 5,000 people nationwide, 703 of whom had been victims of identity

32、theft. Javelin Research, which sells data studies to businesses and consumers, conducts surveys of consumer attitudes and behaviors on a variety of financial matters, including security, risk and fraud. Its most recent identity fraud study found that in addition to well-known methods of thieving suc

33、h as stealing wallets and credit cards, criminals are increasingly using high-tech methods of stealing. FAmong the common schemes: phishing(in which e-mails direct a victim to false Web sites that imitate respectable organizations, including banks), smishing(in which text messages lure a victim into

34、 downloading wicked spyware), pharming(in which wicked code on computer sends victims to false Web sites)and keylogging(in which hidden software monitors victims keystrokes to collect passwords). When people are victimized with those methods, its much harder to detect, often leaving them with no exp

35、lanation about how their identities were stolen. Only about half of the victims file police reports, the study found. GIdentity thieves steal an average of $4,841 per victim, but the end cost to each person is about $373, because banks generally pay back the victims. The study looked at social netwo

36、rking sites such as Facebook and MySpace and found that the young people are compromised more than other groups on the sites but that, in general, the sites account for small percentages of identity theft. Seven percent of young people said their financial information was compromised because of a so

37、cial networking site, compared with 2 to 4 percent for other age groups. But theres a warning: About 55 percent of victims never figure out how their information was stolen. HMary Madden, senior research specialist at the Pew Research Centers Internet & American Life Project, said 72 percent of the

38、young people use social networking sites daily, compared with 40 percent of adults 30 or older. She said young people share personal information about themselves, whether it is their birth date, phone number or a picture from a party, as a way to nourish relationships. I“You are trading information

39、about yourself as a form of cultural currency,“ Madden said. “By posting a photo or an update about what you did at a bar last night, you are sharing with friends to have an exchange and continue a friendship.“ Problems arise, she said, when the information is misused. “Its an interesting balance th

40、ey have to strike in deciding how much to share in order to start or maintain a relationship but not overshare with their network,“ she said. JMadden pointed to studies that show most people can be identified with three pieces of information: their sex, Zip code and date of birth. And seemingly unna

41、med profiles that catalogue preferences, such as movie lists on Netflix, can also be used to identify users. Adam Morrison, 19, a freshman at Arizona State University, realized that his identity had been stolen a few summers ago when he applied for a job and figured out that someone had been using h

42、is Social Security number for his own employment purposes. Morrisons bank account was not affected, but he remains annoyed about how long the person had been using the Social Security number and how it was stolen. “No idea how he got it,“ Morrison said. 37 A recent study of identity fraud by Javelin

43、 Research showed that criminals tended to steal private information with high technology. 38 Someone stole Adam Morrisons Social Security number with the purpose of his own employment. 39 It is hard to detect certain high-tech methods of stealing, like keylogging and smishing. 40 According to Madden

44、, young people share their personal information as a way to nourish relationships. 41 The youth group of 18-to-24 years old is unique in that they are away from home for the first time and their personal information is more likely to be exposed. 42 Young people are hit the hardest in the identity-th

45、eft because it takes longer for them to detect fraud activity. 43 Ryan Thomass personal information was stolen again even after he had taken a course about how to protect information on the Internet. 44 Young people are struggling to keep the balance between sharing information to maintain a relatio

46、nship and avoiding oversharing with their network. 45 Javelin Strategy & Research aims to examine where identity theft threats are coming from and what effects they are having on victims. 46 The end loss of the identity fraud victims is much less than thieves actually steal because the victims get m

47、ost money back from the bank. Section C 46 Pregnancy mothers are getting a new tool to help keep themselves and their babies healthy: pregnancy tips sent directly to their cell phones. The so-called text4baby campaign is the first free, health education program in the U.S. to harness the reach of mo

48、bile phones, according to its sponsors. Organizers say texting is an effective means of delivering wellness tips because 90 percent of people in the U.S. have cell phones. “Especially if you start talking about low-income people, cell phones are the indispensable tool for reaching them and engaging

49、them about their health,“ said Paul Meyer, president of Voxiva, a company which operates health texting programs in Africa, Latin America and India. Studies in those countries have shown that periodic texts can reduce smoking and other unhealthy behaviors in pregnant mothers. Meyer said the U.S. program, run by Voxiva, will be the largest health-related texting program ever undertaken. Under the new service, mothers-to-be who text “BABY“ to a specified number will receive weekly tex

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 外语考试

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1