1、大学英语四级分类模拟题 337 及答案解析(总分:100.00,做题时间:90 分钟)一、Reading Comprehensio(总题数:0,分数:0.00)Sandy“s StoryA. Sandy, a polite and friendly forty-year-old woman with a soft Southern accent, loves cats and frequented the newsgroup rec. pets. cats. B. In 1993 a gang of people from several newsgroups, alt. tasteless,
2、 alt. Syntax. Tactical and alt. bigfoot, “invaded“ the rec. pets. Cats. Newsgroup. By the time the invasion had ended, Sandy had received death threats, hate mails and harassing phone calls. Having her email monitored at work, she had almost lost her job. C. The incident began when one of the invade
3、rs who joined her newsgroup posted a message asking if he could get help destroying his girlfriend“s cat. He said the cat was bothering him, but he didn“t want the girlfriend to find out if he killed it. When he began discussing poison and drowning as options, Sandy spoke up. D. First she sent email
4、 urging him not to kill the cat. But if he insisted, to have it “put to sleep“ humanely. When the email didn“t help, Sandy became concerned, then terrified for the cat. She had nightmares. Eventually she wrote a letter to the police that was subsequently distributed on the Internet. E. The flame war
5、 explored. The request for help in killing the cat was actually a fake. The poster and his friends had purposefully chosen a quiet little newsgroup to start a flame war of mythic proportions. Their stated goal was to inflame the members of the group with their posts. And it worked. But when Sandy co
6、ntacted the police, the invaders became ugly and turned their attention to her. F. Soon Sandy found herself on the member list of a Net. Invaderz FAQ (Frequently Asked Questions document) that was being passed around Usenet and even several computer conventions. Rather than being a victim, Sandy was
7、 singled out as one of the victimizers. “Those of us that opposed the group coming in and invading us (were added to the list),“she said. “It was spammed all over the network as a true document with our names on it.“ G. Sandy was disturbed but tried to ignore the problems as much as possible until s
8、he found herself under investigation by her own company. An irate “U.S. taxpayer“ had written to her employer complaining that she didn“t want the Internet used for actions such as those described in the Net. Invaderz document. “I“m a twenty-two year employee in this company, with a good reputation
9、which is now in the pooper because of this,“ she said. H. Sandy hasn“t prosecuted but the incident exhausted her and made her fearful. She no longer participates in or even reads rec. pets. Cats.; concerned friends email her posts of interest privately. She cannot afford her own home computer, so sh
10、e can only access the Internet through work, where her supervisor now watches her every move. I. Because she acted (in this case alerting the authorities to what she believed to be cruelty to animals), Sandy became the target of a vicious attack launched by a group of people she has never even met.
11、J. In part, the wars going on in cyberspace are cultural wars. Who is to decide what is polite and acceptable? Some time ago, I talked with one of the founders of alt, syntax. Tactical, who calls himself Antebi. His responses to those who suggest his tactics are uncivilized “Learn to use killfiles,“
12、 he says. “Grow up, welcome to reality.“ K. After talking with him, I understood his group to be somewhat like an Internet fraternity, a bunch of young men who like to do virtual “panty raids“ on unsuspecting newsgroups. The young people themselves aren“t the problem (I do not think alt. Syntax. tac
13、tical was responsible for the death threats to Sandy), but that kind of mischievous mentality, coupled with a lot of free time, means that certain people can abuse their power in the virtual world. L. But should the virtual world be one where war is the only metaphor? An invading army swept through
14、Sandy“s village, and when she reached out to protect someone else, they turned their sights on her. She was attacked, accused, harassed and threatenedwith no possible resource. The army captain merely says she should have armed herself. But perhaps there are other ways to live than by the rule of th
15、e strongest? Isn“t that what civilization is supposed to be about?(分数:25.00)(1).At the beginning of the incident, one of the invaders wanted Sandy to kill his girlfriend“s cat.(分数:2.50)(2).On the member list, Sandy found herself a victimizer.(分数:2.50)(3).The invasion in 1993 almost made Sandy lose h
16、er job.(分数:2.50)(4).Exhaustion and fear prevented Sandy from participating in rec. pets. cats.(分数:2.50)(5).To some degree, the wars in cyberspace are mostly related to culture.(分数:2.50)(6).The message posted was fake, whose purpose was to irritate the members of the group.(分数:2.50)(7).When Sandy try
17、ing protecting someone else, she was noticed and attacked.(分数:2.50)(8).Mischievous mentality indulges certain people with abuse of their power in the virtual world.(分数:2.50)(9).When Sandy found herself under investigation by her own company, she was irritated.(分数:2.50)(10).Sandy wrote to the police
18、when she failed to persuade him not to kill the cat.(分数:2.50)Preparing for Computer DisastersSummary A. When home office computers go down, many small businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimizing their effects is quite straightforward. B. Fires, powe
19、r surges, and floods, they“re all facts of life. We read about them in the morning paper and see them on the evening news. We sympathize with the victims and commiserate over their bad luck. We also shake our heads at the digital consequencesmelted computers, system failures, destroyed data. Yet, so
20、mehow, many of us continue to live by that old mantra of denial: “It won“t happen to me.“ Well, the truth is, at some point you“ll probably have to deal with at least one disaster. That“s just how it goes, and in most aspects of our lives we do something about it. We buy insurance. We stow away prov
21、isions. We even make disaster plans and run drills. But for some reason, computer disaster recovery is a blind spot for many of us. It shouldn“t be. Home computers contain some of our most important information, both business and personal, and making certain our data survives a disaster should be a
22、priority. Moreover, even the smallest disaster can be a serious disruption. Personal computers have become an integral part of the smooth-running household. We use them to communicate, shop, and do homework, and they“re even more vital to home office users. When home office computers go down, many s
23、mall businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimize their effects is quite straightforward. With a good offsite storage plan and the right tools, you can bounce back quickly and easily from minor computer disasters. And, should a major calamity strike, y
24、ou can rest assured your data is safe. Offsite Storage: Major DisastersC. House fires and floods are among the most devastating causes of personal computer destruction. That“s why a solid offsite backup and recovery plan is essential. Although many home users faithfully back up their hard drives, ma
25、ny would still lose all their data should their house flood our burn. That“s because they keep their backups in relatively close to their computers. Their backup disks might not be in the same room as their computerstucked away in a closet or even the garagebut they“re not nearly far enough away sho
26、uld a serious disaster strike. So, it“s important to back up your system to a removable medium and to store it elsewhere. D. There are many ways to approach offsite storage. It starts with choice of backup tools and storage medium. Disaster situations are stressful, and your recovery tools shouldn“t
27、 add to that stress. They must be dependable and intuitive, making it easy to schedule regular backups and to retrieve files in a pinch. They must also be compatible with your choice of backup medium. Depending on your tools, you can back up to a variety of durable disk typesfrom CDs to Jaz drives t
28、o remote network servers. Although many of these storage media have high capacity, a backup tool with compression capabilities is a big plus, eliminating the inconvenience of multiple disks or large uploads. E. Once you select your tools and a suitable medium, you need to find a remote place to stor
29、e your backups. The options are endless. However, no matter where you choose, be sure the site is secure, easily accessible, and a good distance away from your home. You may also want to consider using an Interact-based backup service. More and more service providers are offering storage space on th
30、eir servers, and uploading files to a remote location has become an attractive alternative to conventional offsite storage. Of course, before using one of these services, make certain you completely trust the service provider and its security methods. Whatever you do, schedule backups regularly and
31、store them far away from your home. Come What May: Handling the Garden Variety Computer CrisisF. Not all home computer damage results from physical disaster. Many less menacing problems can also hobble your PC or destroy your information. Systems crash, kids “rearrange“ data, adults inadvertently de
32、lete files. Although these events might not seem calamitous, they can have serious implications. So, once again, it“s important to be prepared. As with physical disasters, regular backups are essential. However, some of these smaller issues require a response that“s more nuanced than wholesale backu
33、p and restoration. To deal with less-than-total disaster, your tool set must be both powerful and agile. For example, when a small number of files are compromised, you may want to retrieve those files alone. Meanwhile, if just your settings are affected, you“ll want a simple way to roll back to your
34、 preferred setup. Yet, should your operating system fail, you“ll need a way to boot your computer and perform large-scale recovery. Computer crises come in all shapes and sizes, and your backup and recovery tools must be flexible enough to meet each challenge. The Right Tools for the Right Job: Gear
35、ing up for DisasterG. When disaster strikes, the quality of your backup tools can make the difference between utter frustration and peace of mind. Symantec understands this and offers a range of top quality backup and recovery solutions. Norton GoBack is the perfect tool for random system crashes, f
36、ailed installations, and inadvertent deletions. With this powerful and convenient solution, it“s simple to retrieve overwritten files or to bring your system back to its pre-crash state. Norton Ghost is a time-tested home office solution. Equipped to handle full-scale backups, it“s also handy for cl
37、oning hard drives and facilitating system upgrades. A favorite choice for IT professionals, it“s the ideal tool for the burgeoning home office. You can buy Norton Ghost and Norton GoBack separately, or get them both when you purchase Norton System Works. H. Life“s disasters, large and small, often c
38、atch us by surprise. However, with a little planning and the right tools, you can reduce those disasters to bumps in the road. So, don“t wait another day. Buy a good set of disaster recovery tools, set up an automatic backup schedule, and perform a dry run every now and again. Then, rest easy.(分数:25
39、.00)(1).It“s necessary for us to back up our systems to some transferable medium and to put it somewhere else.(分数:2.50)(2).Not all damage of your computer caused by physical disaster.(分数:2.50)(3).The quality of your backup tools determines whether you are frustrated or have a peaceful mind when disa
40、ster strikes.(分数:2.50)(4).For some reason, computer disaster recovery is always ignored by many of us.(分数:2.50)(5).Taking steps to recover from computer disasters can minimize bad effects.(分数:2.50)(6).House fires and floods are the most devastating causes of personal computer destruction.(分数:2.50)(7
41、).With a good offsite storage plan and the right tools, you can bounce back quickly in minor computer disasters.(分数:2.50)(8).Preparation for computer disasters should do from time to time.(分数:2.50)(9).Backup and recovery tools must be flexible enough to deal with various computer crises.(分数:2.50)(10
42、).You should find a distant place to store your backups after selecting your tools and a suitable medium.(分数:2.50)Why Drug Testing Is NeededA. The illicit drug trade in America has fast become a $110 billion annual business. According to the Research Triangle Institute, A North Carolina-based resear
43、ch organization, drug abuse cost the U.S. economy $60 billion in 1983, nearly a 30 percent increase from the more than $47 billion estimated for 1980. B. No one seriously disputes that drug abuse in the workplace is a serious and growing problem for both public and private employers. Increasingly, t
44、he problem continues to contribute to the high rate of employee absenteeism, rising health care costs, a high rate of accidents, and the low productivity of our work force. It has been aptly called an American tragedy. C. The possibility of protests within certain shops also exists. Job actions not
45、for more pay but to be a free citizen at work could put some heat on certain company officials. D. Take the Los Angeles Times . Its editorial page has been among the most forceful and lucid in the nation in fighting to keep the Bill of Rights in working order. Yet, according to Daniel Jussim, writin
46、g in the ACLU“s Civil Liberties newsletter, The “ Los Angeles Times , though its director of employee relations says there“s no particular drug problem at his newspaper, recently adopted a mandatory urinalysis program “to stay current with what other employers are doing.“ E. Imagine the impact in Lo
47、s Angeles if Anthony Day, the civil libertarian who is editor of the Los Angeles Times “ editorial page, were to lead a picket line outside the paper with such signs as: JAMES OTIS, FATHER OF THE FOURTH AMENDMENT, FOUGHT BRITISH GENERAL SEARCH WARRANTS ON BEHALF OF WORKING PEOPLENOT JUST PUBLISHERS.
48、 F. The need for alliances to preserve what“s left of privacy grows greater by the day. Charles Seabrook writes of new tests that can “detect the presence of the abnormal levels of chemicals found in patients with severe depression, schizophrenia, and manic-depression.that can detect chemical “marke
49、rs“ that may mean a person is at high risk of developing diabetes, arthritis, or cancer.That can screen for more than 150 genetic disease, including sickle cell anemia.and cystic fibrosis.“ G. Would an employer hire someone who is at risk of developing cancer? Should an employer have access to such private information? H. On a more modest level, a new test developed by Werner Baumgartner, a Los Angeles chemist, bypasses such old-time procedures as requiring the random suspect to urinate into a cup or bottle. The new test uses radiation on hair and discloses not only what drugs have been