1、大学四级-692 及答案解析(总分:700.00,做题时间:90 分钟)一、BPart Writing(总题数:1,分数:103.00)1.目前许多商品都存在包装过度的现象2. 这种现象会带来什么影响3. 我的看法On Over-packing(分数:103.00)_二、BPart Reading (总题数:1,分数:70.00)Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For ques
2、tions 1-7, choose the best answer from the four choices marked A), B), C) and D). For questions 8-10, complete the sentences with the information given in the passage.Computer CrimeA computer crime is generally defined as one that involves the use of computers and software for illegal purposes. This
3、 doesnt mean that all the crimes are new types of crime. On the contrary, many of these crimes, such as embezzlement (盗用)of funds, the alteration of records, theft, vandalism (破坏行为), sabotage (阴谋破坏), and terrorism, can be committed without a computer. But with a computer, these offenses can be carri
4、ed out more quickly and with less chance that the person responsible for the crime will be discovered. Computer crimes are on the rise and have been for the last twelve years. The British Crime Survey in 2002 and 2003 showed that 18% of households with internet access said their home computer had be
5、en affected by a virus. This had increased to 27% in 2003 and 2004. One-third said the virus had damaged their computer. The biennial Department of Trade and Industry (DTI) Security Breaches survey reports that 62% of UK businesses had a computer security incident in the 2006. These statistics may u
6、nderestimate the real situation as many organizations or individuals may be unaware that the security of their computer has been compromised. Just how much these computer crimes cost the American public is in dispute, but estimates range from $3 billion to $5 billion annually. Even the FBI, which at
7、tempts to keep track of the growth or decline of all kinds of crimes, is unable to say precisely how large a loss is involved; however, it estimates that the average take from a company hit by computer crime is $ 600,000. A number of reasons are given for the increase in computer crime: (A) more com
8、puters in use and, thus, more people who are familiar with basic computer operation; (B) more computers tied together in satellite and other data-transmission networks; and (C) the easy access of microcomputers to huge mainframe data bases. The criminal Movies and newspaper stories might lead us to
9、believe that most computer crimes are committed by teenage “hackers“brilliant and basically good children who let their imagination and technical genius get them into trouble. But a realistic look at the crimes reveals that the offender is likely to be an employee of the firm against which the crime
10、 has been committed, i. e., an “insider“. Targets of computer crime Some attacks do not have a specific target. However, attacks against specific computers or groups of computers are becoming more common. Home computer users, organizations with large networks of computers, or entire infrastructures
11、may be targeted. Attackers using computers may also attempt to damage the functioning of the Critical National Infrastructure (CNI) which includes emergency services, telecommunications, energy distribution and finance, all of which rely on IT. Many CNI systems which were once isolated are now conne
12、cted to the internet, increasing their vulnerability. There has been speculation over the prospect of terrorists using electronic attacks to target computer systems and networks. According to the National Infrastructure Security Coordination Centre (NISCC) , the probability of terrorists carrying ou
13、t an electronic attack against the CNI is currently low compared with other risks such as using explosive devices. Difficulty of detection and prevention Given the kind of person who commits a computer crime and the environment in which the crime occurs, it is often difficult to detect who the crimi
14、nal is. First of all, the crime may be so complex that months or years go by before anyone discovers it. Second, once the crime has been revealed, it is not easy to find a clear trail of evidence that leads back to the guilty party. After all, looking for “weapons“ or fingerprints does not occur as
15、it might in the investigation of more conventional crimes. Third, there are usually no witnesses to the computer crime, even though it may be taking place in a room filled with people. Who is to say if the person at the next terminal, calmly keying in data, is doing the companys work or committing a
16、 criminal act? Fourth, not enough people in management and law enforcement know enough about computer technology to prevent the crimes. Authorities have to be familiar with the computers capabilities within a given situation to guard against its misuses. In some large cities, such as Los Angeles, po
17、lice departments have set up specially trained computer crime units. But even when an offender is caught, the investigators, attorneys, judges, or juries may find the alleged crime too complicated and perplexing to handle. More attorneys are specializing in computer law and studying the computers po
18、tential for misuse. After a computer crime has been discovered, many companies do not report it or prosecute the person responsible. A company may not announce the crime out of fear that the public will find out the weaknesses of its computer system and lose confidence in its organization. Banks, cr
19、edit card companies, and investment firms are especially sensitive about revealing their vulnerabilities because they rely heavily on customer trust. To avoid public attention, cautious companies will often settle cases of computer tampering out of court. And if cases do go to trial and the offender
20、s are convicted, they may be punished only by a fine or light sentence because the judge or jury isnt fully trained to understand the nature and seriousness of the crime. Not all companies are timid in apprehending computer criminals. For example, Connecticut General Life Insurance Company decided i
21、t had to get tough on violators. So when the company discovered that one of its computer technicians had embezzled $200,000 by entering false benefit claims, it presented its findings to the states attorney and aided in the prosecution of the technician. The technician was found guilty and sentenced
22、 to prison, not just for the computer misuse, but also for grand theft and insurance fraud. Connecticut General now has a policy of reporting all incidents of theft or fraud, no matter how small. Criminals have adapted the advancements of computer technology to further their own illegal activities.
23、Unfortunately, their actions have far out-paced the ability of police to respond effectively. Protocols must be developed for law enforcement that addresses the various categories of computer crime. Investigators must know the materials to search and seize, the electronic evidence to recover, and th
24、e chain of custody to maintain. Without question, law enforcement must be better prepared to deal with the many aspects of computer-related crimes and the techno-criminals who commit them.(分数:70.00)(1).A computer crime is _.(分数:7.00)A.the offense that the person responsible for the crime will be dis
25、covered more quicklyB.the crime that all the criminals are new types of crimeC.committed by robbers, vandals, and terroristsD.an illegal behavior that involves the use of computers and software(2).The reasons that computer crimes are increasing are all mentioned in the passage EXCEPT _.(分数:7.00)A.mo
26、re people are using computersB.more computers are tied togetherC.peoples moralities are decreasingD.it is easy for microcomputers to get access to huge data bases(3).We are misled by movies and newspaper stories that _.(分数:7.00)A.teenage hackers committed most computer crimesB.employees of the firm
27、committed most computer crimesC.an “insider“ is the computer criminalD.the offender is likely to be the boss of the company(4).Which of the following is NOT the target of computer crime?(分数:7.00)A.Family computers.B.Computers without networks.C.Computer infrastructures.D.Computers with large network
28、s in companies.(5).Computer crime is difficult to detect and prevent because _.(分数:7.00)A.the crime may be done by more than one personB.computers themselves have no good firewallC.computer crime doesnt leave any trail behindD.few people witness the computer crime(6).Many companies do not bring a su
29、it against computer crimes because _.(分数:7.00)A.criminals are too powerful to be conqueredB.law procedures against computer crimes usually cost a lot of moneyC.they fear that public will not believe their organization any moreD.they are afraid of the criminals(7).Computer criminals may not be punish
30、ed heavily because _.(分数:7.00)A.their crime is too light for the company or societyB.the criminals are too powerful to be punishedC.the judge show their sympathy for the criminalsD.the judge dont know enough about the nature of the crime(8).But even when a computer criminal is caught, people involve
31、d in the case may find the alleged crime _.(分数:7.00)填空项 1:_(9).Cautious companies will often deal with computer crimes out of court in order to avoid _.(分数:7.00)填空项 1:_(10).Some companies, take Connecticut General Life for example, are not _ computer criminals.(分数:7.00)填空项 1:_三、BPart Listenin(总题数:4,
32、分数:105.00)BSection A/BDirections: In this section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation, one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will
33、be a pause. During the pause, you must read the four choices marked A), B), C) and D), and decide which is the best answer.(分数:35.00)A.They will go to the university.B.They will go to a restaurant.C.They have no idea.D.They will go to Hunan.A.They are colleagues.B.They are classmates.C.They are stra
34、ngers.D.They are friends.A.The man wont help the woman.B.The man will do the filing work tomorrow.C.The man only does urgent things.D.The man wants to leave the filing work to others.A.He got out of the kitchen to answer the phone.B.He didnt hear the phone ringing.C.Theres something wrong with the p
35、hone.D.He went into the kitchen earlier than usual.A.They are talking about their hard time.B.They are talking about the earthquake.C.They are talking about their feelings after the earthquake.D.They are talking about the TV program.(分数:21.00)A.She thinks its worthwhile though its very expensive.B.S
36、he dislikes it because it is out of fashion.C.She thinks its not worthwhile to buy it.D.She thinks if she buys it, her wallet will be hard.A.He thinks the woman is very proud.B.He thinks its acceptable.C.He dislikes her way.D.He appreciates her way.A.He set a good example for victims of the earthqua
37、ke.B.He donated money for earthquake relief.C.He suffered a lot from the earthquake.D.He promised money for people in hospital.Questions 19 to 22 are based on the conversation you have just heard.(分数:28.00)A.Time really flies.B.The plans after graduation.C.The economic status of China.D.How to get a
38、 masters degree.A.China has a long history.B.China has a colorful and rich culture.C.Its not expensive and people are friendly.D.The scenery in China is beautiful.A.He plans to do a masters degree of law.B.He wants to be a teacher.C.He plans to find a job in a joint venture company.D.He has no plan.
39、A.If you are very sophisticated.B.If you are very hard-working.C.If your academic merits are excellent.D.If you are wealthy.Questions 23 to 25 are based on the conversation you have just heard.(分数:21.00)A.They are discussing the Mid-autumn Festival.B.They are discussing the big dinner.C.The man is a
40、sking for some advice on going to a friends home.D.The man is asking if he can bring fruits.A.He may bring a small gift.B.He shouldnt bring fruit.C.He may bring some expensive things.D.He neednt bring anything.A.Any time in his country.B.When they visit people in hospital.C.When they visit a family.
41、D.People never bring fruits to others home.四、BSection B/B(总题数:3,分数:70.00)Directions: In this section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the
42、best answer from the four choices marked A), B), C) and D).Passage OneQuestions 26 to 28 are based on the passage you have just heard.(分数:21.00)A.200.B.219.C.2,795.D.290.A.Spanish.B.Arabic.C.French.D.Welsh.A.Because they are realizing the importance of foreign language in their future world.B.Becaus
43、e they dont want to communicate with foreigners in English.C.Because the government regulates the study of foreign language.D.Because more and more foreign language courses are programmed at universities.Passage TwoQuestions 29 to 31 are based on the passage you have just heard.(分数:21.00)A.They need
44、 to cost more money.B.They need to drive there by cars.C.They usually need to spend about $10 to $15 a day.D.They usually need to reserve in advance.A.There are enough parking spaces for guests.B.The guests can cook meal.C.They usually locate outside of the center of city.D.They are more convenient
45、for the people who driving cars.A.Because they are more expensive than motels.B.Because it is inconvenient to rent this private rooms.C.Because they cannot provide modern conveniences as motels.D.Because they are old-fashioned and outdated.Passage ThreeQuestions 32 to 35 are based on the passage you
46、 have just heard.(分数:28.00)A.Arguments do not always occur between couples.B.Arguments or fights may lead to the end of the marriage.C.Couples should argue with each other properly.D.Arguments can be avoided after the romantic days of courtship.A.Forty-two newly-married couples.B.Forty-two married c
47、ouples who have been together for at least twelve years.C.Forty-two married couples who have been together for an average of twelve years.D.Forty-two married couples who have marital stress.A.One day.B.Two days.C.Three days.D.Four days.A.A couple that has stressful discussion takes the longest time
48、to heal the wound.B.A couple that has hostile argument takes the longest time to heal the wound.C.Supportive discussion slows the wound healing process.D.Higher levels of stress speed up the wound healing process.五、BSection C/B(总题数:1,分数:77.00)Directions: In this section, you will hear a passage thre
49、e times. When the passage is read for the first time, you should listen carefully for its general idea. When the passage is read for the second time, you are required to fill in the blanks numbered from 36 to 43 with the exact words you have just heard. For blanks numbered 44 to 46 you are required to fill in the missing information. For these bl