欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    大学六级-69及答案解析.doc

    • 资源ID:1449626       资源大小:181.50KB        全文页数:33页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    大学六级-69及答案解析.doc

    1、大学六级-69 及答案解析(总分:693.00,做题时间:90 分钟)一、BPart Writing(总题数:1,分数:106.00)1.BLeisure time in a typical week: by sex and employment status, 19981999/B (分数:106.00)_二、BPart Reading (总题数:1,分数:70.00)BKeeping the Net Secure/BOn September 11 traditional telephone providers did a heroic job of struggling to restor

    2、e service. When the World Trade Center towers fell, they severely damaged a Verizon central office with 350,000 voice lines and 3.5 million data circuits carrying the financial information that is the lifeblood of Wall Street firms. Verizon employees and those of many other telecommunications carder

    3、s worked night and day, alongside the firemen, the police, and volunteers, at their own recovery job. In about a week they had rerouted some two million data circuits, restored switches, and installed temporary power supplies. The other 1.5 million circuits originated in buildings that no longer exi

    4、st.In the days after the attack the number of voice calls in the five boroughs of New York City doubled, from the normal 115 million a day to more than 230 million. For the next six days Verizon waived charges for its pay phones in Manhattan. On a single day following the disaster residents placed s

    5、ome 22,000 local calls free of charge from regular sidewalk pay phones below Canal Street, and Williams Communications switched five million voice calls in the metropolitan area-three times the average daily volume. AT Yahoos PC to Phone calling service increased by 59 percent. The performance of th

    6、ese voice-over-IP services suggests that in only a handful of years most voice traffic is likely to be carded on the Internet.Why did the Internet work so well in the face of huge volume? Because its “distributed“ technology is inherently robust. “Normal“ phone connections, whether by means of wired

    7、 line networks or by wireless cellular networks, open a specific circuit, or channel, connecting the person who is called and the caller. Just as if a superhighway lane were opened for one car only, the circuit remains dedicated to the conversation even if no one is speaking at the moment. If too ma

    8、ny circuits are requested at one time, the system blocks calls.In contrast, Internet messages dont travel on designated circuits. Instead, the messages are coded in is and Os, and then disassembled into packets of data. The packets go out from the PC down the phone line and into the maze of intercon

    9、nected fibers that envelops every metropolitan area of every developed country in the world. Like cars on a superhighway, packets share lanes on the Net.Each packet contains a destination address. As the packet moves into the maze, it encounters a router that selects the next step in the network. If

    10、 the router senses congestion on one route, it selects another. The AOL instant-message packets could work their way around the jams and outage of the voice network and find their destinations in seconds.One lesson from September 11 is that in order to maintain an effective communications system in

    11、the face of any calamity, we should promote and protect the Internet as a primary network, encouraging the private sector and using the resources of the public sector to make it faster, more robust, ubiquitous, and better integrated with other media. This policy would be consistent with the Internet

    12、s original development as an aspect of national security.Not many creators of Internet technology or leaders of Internet companies have been seriously interested in world affairs. Indeed, only yesterday many people imagined, naively, that the rise of the medium meant the end of government, the trium

    13、ph of libertarian visions, and the dawning of a new age of spontaneous self-organization. In the long run the Nets emphasis on liberty can be fused with the needs of a civil equitable, ordered state. But in the short run we need practical steps to help keep the Internet secure. The worlds citizens,

    14、businesses, and governments should come together to take two actions.First, Internet access should be made truly global. In less developed countries this means expanding communications systems so that more people have exposure to and access to information from the outside world. Obviously, communica

    15、tions technology does not by itself end conflict or convert nations to democracy. But it helps, and those goals are easier to reach with a modem communications system than without one. However our current war against terrorism ends, along the way the United States and its allies will undoubtedly mak

    16、e a variety of economic promises to the Central Asian states whose support we need. It would be better to direct aid toward thought-out goals than to grant it slapdash. A $ 10 billion investment fund for communications improvements throughout the developing world, managed by an independent board and

    17、 funded half by private institutions and half by governments, would be a wise use of our resources.In developed countries universal access means ensuring that businesses and citizens can all get high-speed connections to the Internet, much as they now have universal dial-tone access to the tradition

    18、al telephone system. The United States has a long history of subsidizing the growth of a democratically available communications system. In keeping with the established universal service policy, business and suburban customers of telephone services are “overcharged“ some $ 30 billion each year in or

    19、der to subsidize basic telephone rates for rural customers. Diverting $ 10 billion of this universal-service funding could eventually make broadband service available on a near universal basis. Consumers could draw on a federal fund for whichever competing service they chose. The fund would pay a hi

    20、gh proportion of the total cost for poor and rural users, a low one or none at all for rich users. Andy Grove, the chairman of Intel, recently called for a similar investment plan.Second, the Internets defenses need to be strengthened. The networks that compose its backbone should be encouraged with

    21、 strong incentives to develop redundant interconnection points and diverse paths. The Internets conceptual design makes it inherently resilient, but its physical structure and hardware need to be more secure than they are now. The one or two dozen essential crossroads of the Internet are basically c

    22、ollections of computers in buildings. These are vital nodes of our national security, and they ought to be as carefully protected as our military installations. The Internet has a rising number of co-location facilities where many fiber cables are aggregated. If any of them goes down, traffic can be

    23、 interrupted for long periods. This became clear last summer in Baltimore, when a train derailment damaged a substantial fiber link and affected the flow of Internet traffic around the globe.Every essential node should have a backup. Internet messages are now carried mainly on fiber-optic systems. T

    24、hese systems should be backed up by microwave and satellite-transmission systems.The terrorists did not directly target our communications networks, but those networks are an integral part of the democratic capitalism that they did attack. And we can use those networks to help fight back.(分数:70.00)(

    25、1).The data circuits which had been damaged on September 11 were rerouted more than a half in about a week.(分数:7.00)填空项 1:_(2).There are fewer voice calls in New York in the days after the attack.(分数:7.00)填空项 1:_(3).In all coastal cities, cell phone net works could not keep up with demand.(分数:7.00)填

    26、空项 1:_(4).More than half of Americans now use the Internet.(分数:7.00)填空项 1:_(5).Some carriers pushed their voice traffic over the Internet because _.(分数:7.00)填空项 1:_(6).The system blocks calls when _.(分数:7.00)填空项 1:_(7).We should promote and protect the Internet as a primary network in order to _.(分数

    27、:7.00)填空项 1:_(8).The second action which should be taken to keep the Internet secure is _.(分数:7.00)填空项 1:_(9).A substantial fiber link damaged by a train derailment affected _.(分数:7.00)填空项 1:_(10).Fiber-optic system should be backed up by _.(分数:7.00)填空项 1:_三、BPart Listenin(总题数:3,分数:105.00)BQuestions

    28、 11 to 18 are based on the conversation you have just heard./B(分数:56.00)A.They should meet another time this week.B.She wont be busy this week.C.She is angry that the man doesnt wait for her.D.There wont be another time available for them in this week to meet.A.Try the train ticket instead.B.Book an

    29、 air ticket in advance.C.Wait for others to cancel their booking.D.Buy a ticket at a higher price.A.The library has already chosen some people to work there.B.She is going to give the man a job offer.C.The library is looking for more applicants.D.The man should hurry up.A.He didnt call the hotel in

    30、advance.B.He will leave immediately.C.He refuses to take the room the hotel offers.D.He dislikes the hotel.A.She goes out for shopping.B.She is a good student.C.She always talks on the phone.D.She is good at cooking.A.He forgets the name of the dentist.B.He also suffers from toothache now.C.He sugge

    31、sted the woman to see a dentist a week ago.D.He has been busy all the week.A.Lend the novel to the man.B.Ask Alice to see if she can lend the novel to the man.C.Buy the novel from Alice.D.Visit Alice in the hospitalA.The drama wasnt interesting at all.B.His watch is expensive.C.He had another appoin

    32、tment last night.D.The woman should have been there last night.Questions 19 to 22 are based on the conversation you have just heard.(分数:28.00)A.To borrow his book.B.To talk about the term paper.C.To invite him to go canoeing.D.To ask him out for dinner.A.Food for the Friday night cookout.B.Tent for

    33、sleeping out.C.Drinks for all day Saturday,D.A bathing suit and a sleeping bag.A.Eating out.B.Camping.C.Canoeing,D.Swimming.A.The womans.B.Toms.C.The mans.D.The trip leaders.Questions 23 to 25 are based on the conversation you have just heard.(分数:21.00)A.The food in the kitchen.B.The TV Programme.C.

    34、The roommate of the man.D.The coming exam.A.Because they are not friends.B.Because he failed last exam.C.Because they are not in the same class.D.Because she has never told him about that.A.Because its too late.B.Because he doesnt know her.C.Because she is the best student.D.Because she is a friend

    35、of the woman.四、BSection B/B(总题数:3,分数:70.00)BPassage OneQuestions 26 to 29 are based on the passage you have just beard./B(分数:28.00)A.One.B.Two.C.Three.D.Four.A.Nothing about the mountains.B.The real experience of being in the mountains.C.Mountain climbing with family members.D.Skills of rock climbin

    36、g.A.Mountain climbing.B.Rock climbing.C.Hiking.D.Fishing.A.Because the mountain is over 12,000 feet high.B.Because he had no experience since he left college.C.Because his wife wasnt good at mountain climbing.D.Because his children were too young.BPassage TwoQuestions 30 to 32 are based on the passa

    37、ge you have just heard./B(分数:21.00)A.Because it takes time before your brain realizes that youre full.B.Because the slower you eat, the less you absorb.C.Because its healthier to eat slowly.D.Because it helps to hum the fat in your body.A.Happy.B.Depressed.C.Angry.D.Cheerful.A.None.B.Two.C.Three.D.M

    38、ore than three.BPassage ThreeQuestions 33 to 35 are based on the passage you have just heard./B(分数:21.00)A.Because men are seldom seen in the forest.B.Because tigers are afraid of something.C.Because men are not edible.D.Because men shout aloud.A.The man seems to have no back and from the side can b

    39、arely be seen.B.The man is smaller than the tiger itself.C.The man smells bad.D.The man looks very much like a deer.A.Because men are less likely to be well armed when they bend.B.Because men seem more obedient when they bend.C.Because men more closely resembles a medium-sized deer when they bend.D.

    40、Because men are cutting grass when they bend.五、BSection C/B(总题数:1,分数:77.00)The origins of bottled water can beU (36) /Uback to the earliestU (37) /U. Well aware of waters health facts, the Romans searched for and developed sources as they set aboutU (38) /Utheir empire.The spa movement that began to

    41、U (39) /Uin Europe in the eighteenth century had its origins in baths dating from Roman times. Science andU (40) /Utouted natural mineral watersU (41) /Ueffects for bathing, showering and drinking. For example, as early as 1760, people came to Contrexeville in France for a cure toU (42) /Ukidney sto

    42、nes. The spa tradition was also developing in many other countries, including Italy and the Americas.Cold spa waters were bottled for the first time in France in the 1850s. The legal permit to bottle Vittel Grande Source natural mineral water wasU (43) /Uas early as 1855.U(44) /U. In 1845, Poland Sp

    43、ring water was bottled for sale in threegallon demi-johns. In South America, Sao Lourenco bottled water appeared in Brazil in 1890. U(45) /Uthe haute bourgeoisie, captains of industry, politicians, royalty, and so on. It was bottled in glass or stoneware, with porcelain or cork stoppers. By the mid-

    44、nineteenth century, however, U (46) /U. Bottling methods changed as consumption spread, and by the mid-twentieth century, global production had climbed to several hundred million bottles.(分数:77.00)(1).(分数:7.00)填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_填空项 1:_六、BPart Readi

    45、ng (总题数:1,分数:90.00)A child who has once been pleased with a tale likes, as a rule, to have it retold in identically the same words, but this should not lead parents to treat printed fairy stories as sacred texts. It is always much better to tell a story than to read it out of a book and, if a parent

    46、 can produce an improvement on the printed text, so much the better.A charge made against fairy tales is that they harm the child by frightening him or arousing his sadistic impulses. To prove the latter, one would have to show in a controlled experiment that children who have read fairy stories wer

    47、e more often guilty of cruelty than those who had not. On the whole, their symbolic verbal discharge seems to be rather a safety valve than an incitement to overt action. As to fears, there are, I think, well-authenticated cases of children being dangerously terrified by some fairy story. Often, however, this arises from the child having been told the story on only one occasion. Familiarity with the story by repetition turns the pain of fear into the pleasure of a fear faced and mastered.There are also people who obje


    注意事项

    本文(大学六级-69及答案解析.doc)为本站会员(terrorscript155)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开