[外语类试卷]大学英语四级模拟试卷69(无答案).doc

上传人:花仙子 文档编号:857875 上传时间:2019-02-23 格式:DOC 页数:25 大小:82KB
下载 相关 举报
[外语类试卷]大学英语四级模拟试卷69(无答案).doc_第1页
第1页 / 共25页
[外语类试卷]大学英语四级模拟试卷69(无答案).doc_第2页
第2页 / 共25页
[外语类试卷]大学英语四级模拟试卷69(无答案).doc_第3页
第3页 / 共25页
[外语类试卷]大学英语四级模拟试卷69(无答案).doc_第4页
第4页 / 共25页
[外语类试卷]大学英语四级模拟试卷69(无答案).doc_第5页
第5页 / 共25页
点击查看更多>>
资源描述

1、大学英语四级模拟试卷 69(无答案)一、Part I Writing (30 minutes)1 For this part, you are allowed thirty minutes to write a composition on the topic: College Students Supporting Countryside. You should write at least 120 words following the outline given in Chinese.1. 现今国家号召大学生支农2. 大学生支农存在问题3. 你怎样看待这些问题二、Part II Read

2、ing Comprehension (Skimming and Scanning) (15 minutes)Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions attached to the passage. For questions 1-7, mark:Y (for YES) if the statement agrees with the information given in the passage;N (for NO) i

3、f the statement contradicts the information given in the passage;NG (for NOT GIVEN) if the information is not given in the passage.2 Protect Your Privacy When Job-hunting OnlineIdentity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and use

4、s another persons personal data in some way that involves fraud or deception, typically for economic gain.The numbers associated with identity theft are beginning to add up fast these days. A recent General Accounting Office report estimates that as many as 750,000 Americans are victims of identity

5、theft every year. And that number may be low, as many people choose not to report the crime even if they know they have been victimized.Identity theft is “an absolute epidemic,“ states Robert Ellis Smith, a respected author and advocate of privacy. “Its certainly picked up in the last four or five y

6、ears. Its worldwide. It affects everybody, and theres very little you can do to prevent it and, worst of all, you cant detect it until its probably too late.“Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data, especially your socia

7、l security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data, can be used, if they fall into the wrong hands, to personally profit at your expense. In the United States and Canada, for example, many people have reported that unau

8、thorized persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over their identities altogether, running up vast debts and committing crimes while using the victims names. In many cases, a victims losses may include not only out-of-pocket financial losses, b

9、ut substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible.According to the FBI, identity theft is the number one fraud committed on the Internet. So how do job seekers protect

10、 themselves while continuing to circulate their resumes online? The key to a successful online job search is learning to manage the risks. Here are some tips for staying safe while conducting a job search on the Internet.1. Check for a privacy policy.If you are considering posting your resume online

11、, make sure the job search site you are considering has a privacy policy, like CareerB. The policy should spell out how your information will be used, stored and whether or not it will be shared. You may want to think twice about posting your resume on a site that automatically shares your informati

12、on with others. You could be opening yourself up to unwanted calls from solicitors(推销员).When reviewing the sites privacy policy, youll be able to delete your resume just as easily as you posted it. You wont necessarily want your resume to remain out there on the Internet once you land a job. Remembe

13、r, the longer your resume remains posted on a job board, the more exposure, both positive and not-so-positive, it will receive.2. Take advantage of site features.Lawful job search sites offer levels of privacy protection. Before posting your resume, carefully consider your job search objectives add

14、the level of risk you are willing to assume.CareerB, for example, offers three levels of privacy from which job seekers can choose. The first is standard posting. This option gives job seekers who post their resumes the most visibility to the broadest employer audience possible.The second is anonymo

15、us(匿名的) posting. This allows job seekers the same visibility as those in the standard posting category without any of their contact information being displayed. Job seekers who wish to remain anonymous but want to share some other information may choose which pieces of contact information to display

16、.The third is private posting. This option allows a job seeker to post a resume without having it searched by employers. Private posting allows job seekers to quickly and easily apply for jobs that appear on CareerB without retyping their information.3. Safeguard your identity.Career experts say tha

17、t one of the ways job seekers can stay safe while using the Internet to search out jobs is to conceal their identities. Replace your name on your resume with a generic(泛指的) identifier, such as “Intranet Developer Candidate,“ or “Experienced Marketing Representative.“You should also consider eliminat

18、ing the name and location of your current employer. Depending on your title, it may not be all that difficult to determine who you are once the name of your company is provided. Use a general description of the company such as “Major auto manufacturer,“ or “International packaged goods supplier.“If

19、your job title is unique, consider using the generic equivalent instead of the exact title assigned by your employer.4. Establish an email address for your search.Another way to protect your privacy while seeking employment online is to open up an email account specifically for your online job searc

20、h. This will safeguard your existing email box in the event someone you dont know gets hold of your email address and shares it with others.Using an email address specifically for your job search also eliminates the possibility that you will receive unwelcome emails in your primary mailbox. When nam

21、ing your new email address, be sure that it doesnt contain references to your name or other information that will give away your identity. The best solution is an email address that is relevant to the job you are seeking such as .5. Protect your references.If your resume contains a section with the

22、names and contact information of your references, take it out. Theres no sense in safeguarding your information while sharing private contact information of your references.6. Keep confidential(机密的)information confidential.Do not, under any circumstances, share your social security, drivers license,

23、 and hank account numbers for other personal information, such as race or eye color. Honest employers do not need this information with an initial application. Dont provide this even if they say they need it in order to conduct a background check. This is one of the oldest tricks in the bookdont fal

24、l for it.2 Robert Ellis Smith believes identity theft is difficult to detect and one can hardly do anything to prevent it.(A)Y(B) N(C) NG3 In many cases, identity theft not only causes the victims immediate financial losses but costs them a lot to restore their reputation.(A)Y(B) N(C) NG4 Identity t

25、heft is a minor offence and its harm has been somewhat overestimated.(A)Y(B) N(C) NG5 It is important that your resume not stay online longer than is necessary.(A)Y(B) N(C) NG6 Of the three options offered by CareerB in Suggestion 2, the third one is apparently most strongly recommended.(A)Y(B) N(C)

26、 NG7 Employers require applicants to submit very personal information on background checks.(A)Y(B) N(C) NG8 Applicants are advised to use generic names for themselves and their current employers when seeking employment online.(A)Y(B) N(C) NG9 Using a special email address in the job search can help

27、prevent you from receiving _.10 To protect your references, you should not post online their _.11 According to the passage, identity theft is committed typically for _.Section ADirections: In this section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation,

28、 one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will be a pause. During the pause, you must read the four choices marked A, B, C and D, and decide which is the best answer.(A)The man shouldnt have r

29、eminded her of them so early.(B) She had filled them out before she started.(C) She hasnt filled them out because they are too confusing.(D)She wont be discouraged again.(A)She thinks Mien is a thief.(B) She thinks Allen is clever.(C) She thinks Allen took her earrings by mistake.(D)She thinks Allen

30、 is a suspect.(A)The woman is feeling much worse than she did before.(B) The woman feels nothing at all, except for a headache.(C) The woman felt bad for a while, but is much improved.(D)The woman still has a bad headache.(A)To the theater.(B) To class.(C) To the movie.(D)To the office.(A)Give him a

31、 present for his birthday.(B) Be there early.(C) Kill the time.(D)Remind the man of the birthday.(A)7:15.(B) 7:20.(C) 7:25.(D)7:10.(A)He couldnt agree with the woman.(B) He agrees with woman.(C) He thinks Philip is wise to do so.(D)He thinks Philip should leave for home right now.(A)She wants to see

32、 the mans passport or his drivers license.(B) Drivers license cant be used in this case.(C) She wants to see both.(D)Neither can be used in this case.(A)The man is learning how to use a computer.(B) The woman is showing the man how to put page numbers on a document.(C) The man is printing a document

33、.(D)The man is using his computer to do mathematical functions.(A)He needs to press F-7 to return to the document before be prints it.(B) He has to print the document to see the page numbers.(C) The printer is not working correctly.(D)The numbers are on the screen but they dont print out.(A)She want

34、s the man to listen to the instructions and observe.(B) She wants the man to watch while she performs the operations.(C) She wants the man to ask questions so that she carl help him.(D)She wants the man to try to do it while she gives him instructions.(A)A sick friend.(B) A math class.(C) School pol

35、icy.(D)The mans test.(A)Because it is against the law.(B) Because the man is not a member of Terrys family.(C) Because the woman cannot find the test.(D)Because Terry was too sick to take the test.(A)Young.(B) Purcell.(C) Raleigh.(D)Kelly.(A)Call his friend.(B) Go to the office to get his test.(C) S

36、end the woman a letter.(D)Take the test later.Section BDirections: In this section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from t

37、he four choices marked A, B, C and D.(A)A kind of fruit.(B) Pig fat.(C) A kind of flower.(D)A natural dye.(A)It is not convenient to use.(B) It is very soft.(C) It is not expensive.(D)It is easily broken.(A)Waxes.(B) Colors.(C) Thicker oil.(D)Thinner oil.(A)The importance of advertisement.(B) The so

38、cietys great need of advertisement.(C) The origin of advertisement.(D)The prosperity of advertisement.(A)The local governments.(B) Their owners families.(C) Advertisements.(D)The audience.(A)Advertisements are personal.(B) Advertisements are convincing.(C) Advertisements are unreliable.(D)Advertisem

39、ents are misleading.(A)Three.(B) Twenty-four.(C) Two hundred.(D)Eight.(A)Three.(B) Twenty-four.(C) Two hundred.(D)Eight.(A)Cotton.(B) Coffee.(C) Iron.(D)Rubber.(A)Cameroon is in West Africa.(B) Cameroon is divided by three religions which compete for the loyalty of the 8 million people.(C) Cameroon

40、has developed a strong economy in the past 10 years.(D)Religious conflict is a major social problem in Cameroon.Section CDirections: In this section, you will hear a passage three times. When the passage is read for the first time, you should listen carefully for its general idea. When the passage i

41、s read for the second time, you are required to fill in the blanks numbered from 36 to 43 with the exact words you have just heard. For blanks numbered from 44 to 46 you are required to fill in the missing information. For these blanks, you can either use the exact words you have just heard or write

42、 down the 37 The International Olympic Committee awarded Salt Lake City the 2002 Winter Olympics by a big majority. It seemed that its persistent 【B1】_ had paid off.But because of a 【B2】_ by a dissatisfied employee of the local organizing committee to a Salt Lake City TV station, the Salt Lake City

43、Olympic organizers are 【B3】 _ of bribing the I.O.C. members. It is the I.O.C. members who 【B4】 _ where the next Olympics will take place. So far, four groupsthe I.O.C, the U.S. Olympic Committee, the Justice Department and the Utah Ethics Committee have begun to 【B5 】_ into the mess.Some members of

44、the local organizing committee do not intend to make 【B6】 _ but are expressing their regrets instead. “Obviously, we did break the rules.“ says Ken Bullock, an ashamed organizer. He points out that the 【B7】_ on a bidding city to be friendly and generous can be 【B8】_, and Salt Lake City was hardly th

45、e first to bribe the I.O.C. “The I.O.C. allowed this.“ says Bullock.【B9 】_, but the facts seem beyond doubt. I.O.C. executive Mare Hodler announced last month that 【B10】_, Hodler then accused the previous winning cities of Atlanta, Nagano and Sydney of corruption, but officials in all three cities d

46、eny this charge.【B11 】_.37 【B1 】38 【B2 】39 【B3 】40 【B4 】41 【B5 】42 【B6 】43 【B7 】44 【B8 】45 【B9 】46 【B10 】47 【B11 】Section ADirections: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the pas

47、sage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please mark the corresponding letter for each item with a single line through the center. You may not use any of the words in the bank more than once.48 For more than six centuries

48、 before 1868, Japan was a feudal society 【S1】_(for much of that period) from contact with foreign countries. Feudal influence as well as that of Buddhism(佛都) and Confucianism(儒教) gave women low 【S2】_ in the family and gave them almost no role in running society. The year 1868 【S3】_ the end of the fe

49、udal era. Thereafter Japan entered a period of rapid modernization. But despite fundamental changes in many areas of Japanese life until the end of World War II, modernization did not dramatically 【S4】_ womens status. Leadership was in the hands of a warrior class, not concerned with reforming the social order.In the typical family in the modern pe

展开阅读全文
相关资源
猜你喜欢
  • ETSI EN 300 135-1-2008 Electromagnetic compatibility and Radio spectrum Matters (ERM) Land Mobile Service Citizens- Band (CB) radio equipment Angle-modulated Citizens- Band radio e.pdf ETSI EN 300 135-1-2008 Electromagnetic compatibility and Radio spectrum Matters (ERM) Land Mobile Service Citizens- Band (CB) radio equipment Angle-modulated Citizens- Band radio e.pdf
  • ETSI EN 300 135-1-2008 Electromagnetic compatibility and Radio spectrum Matters (ERM) Land Mobile Service Citizens- Band (CB) radio equipment Angle-modulated Citizens- Band radio e_1.pdf ETSI EN 300 135-1-2008 Electromagnetic compatibility and Radio spectrum Matters (ERM) Land Mobile Service Citizens- Band (CB) radio equipment Angle-modulated Citizens- Band radio e_1.pdf
  • ETSI EN 300 138-1-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 1 P.pdf ETSI EN 300 138-1-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 1 P.pdf
  • ETSI EN 300 138-1-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 1 P_1.pdf ETSI EN 300 138-1-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 1 P_1.pdf
  • ETSI EN 300 138-2-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 2 P.pdf ETSI EN 300 138-2-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 2 P.pdf
  • ETSI EN 300 138-2-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 2 P_1.pdf ETSI EN 300 138-2-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 2 P_1.pdf
  • ETSI EN 300 138-3-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 3 T.pdf ETSI EN 300 138-3-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 3 T.pdf
  • ETSI EN 300 138-3-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 3 T_1.pdf ETSI EN 300 138-3-1998 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 3 T_1.pdf
  • ETSI EN 300 138-4-2000 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 4 A.pdf ETSI EN 300 138-4-2000 Integrated Services Digital Network (ISDN) Closed User Group (CUG) Supplementary Service Digital Subscriber Signalling System No One (DSS1) Protocol Part 4 A.pdf
  • 相关搜索
    资源标签

    当前位置:首页 > 考试资料 > 大学考试

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1