欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    大学英语四级分类模拟题337及答案解析.doc

    • 资源ID:1456949       资源大小:105KB        全文页数:17页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    大学英语四级分类模拟题337及答案解析.doc

    1、大学英语四级分类模拟题 337 及答案解析(总分:100.00,做题时间:90 分钟)一、Reading Comprehensio(总题数:0,分数:0.00)Sandy“s StoryA. Sandy, a polite and friendly forty-year-old woman with a soft Southern accent, loves cats and frequented the newsgroup rec. pets. cats. B. In 1993 a gang of people from several newsgroups, alt. tasteless,

    2、 alt. Syntax. Tactical and alt. bigfoot, “invaded“ the rec. pets. Cats. Newsgroup. By the time the invasion had ended, Sandy had received death threats, hate mails and harassing phone calls. Having her email monitored at work, she had almost lost her job. C. The incident began when one of the invade

    3、rs who joined her newsgroup posted a message asking if he could get help destroying his girlfriend“s cat. He said the cat was bothering him, but he didn“t want the girlfriend to find out if he killed it. When he began discussing poison and drowning as options, Sandy spoke up. D. First she sent email

    4、 urging him not to kill the cat. But if he insisted, to have it “put to sleep“ humanely. When the email didn“t help, Sandy became concerned, then terrified for the cat. She had nightmares. Eventually she wrote a letter to the police that was subsequently distributed on the Internet. E. The flame war

    5、 explored. The request for help in killing the cat was actually a fake. The poster and his friends had purposefully chosen a quiet little newsgroup to start a flame war of mythic proportions. Their stated goal was to inflame the members of the group with their posts. And it worked. But when Sandy co

    6、ntacted the police, the invaders became ugly and turned their attention to her. F. Soon Sandy found herself on the member list of a Net. Invaderz FAQ (Frequently Asked Questions document) that was being passed around Usenet and even several computer conventions. Rather than being a victim, Sandy was

    7、 singled out as one of the victimizers. “Those of us that opposed the group coming in and invading us (were added to the list),“she said. “It was spammed all over the network as a true document with our names on it.“ G. Sandy was disturbed but tried to ignore the problems as much as possible until s

    8、he found herself under investigation by her own company. An irate “U.S. taxpayer“ had written to her employer complaining that she didn“t want the Internet used for actions such as those described in the Net. Invaderz document. “I“m a twenty-two year employee in this company, with a good reputation

    9、which is now in the pooper because of this,“ she said. H. Sandy hasn“t prosecuted but the incident exhausted her and made her fearful. She no longer participates in or even reads rec. pets. Cats.; concerned friends email her posts of interest privately. She cannot afford her own home computer, so sh

    10、e can only access the Internet through work, where her supervisor now watches her every move. I. Because she acted (in this case alerting the authorities to what she believed to be cruelty to animals), Sandy became the target of a vicious attack launched by a group of people she has never even met.

    11、J. In part, the wars going on in cyberspace are cultural wars. Who is to decide what is polite and acceptable? Some time ago, I talked with one of the founders of alt, syntax. Tactical, who calls himself Antebi. His responses to those who suggest his tactics are uncivilized “Learn to use killfiles,“

    12、 he says. “Grow up, welcome to reality.“ K. After talking with him, I understood his group to be somewhat like an Internet fraternity, a bunch of young men who like to do virtual “panty raids“ on unsuspecting newsgroups. The young people themselves aren“t the problem (I do not think alt. Syntax. tac

    13、tical was responsible for the death threats to Sandy), but that kind of mischievous mentality, coupled with a lot of free time, means that certain people can abuse their power in the virtual world. L. But should the virtual world be one where war is the only metaphor? An invading army swept through

    14、Sandy“s village, and when she reached out to protect someone else, they turned their sights on her. She was attacked, accused, harassed and threatenedwith no possible resource. The army captain merely says she should have armed herself. But perhaps there are other ways to live than by the rule of th

    15、e strongest? Isn“t that what civilization is supposed to be about?(分数:25.00)(1).At the beginning of the incident, one of the invaders wanted Sandy to kill his girlfriend“s cat.(分数:2.50)(2).On the member list, Sandy found herself a victimizer.(分数:2.50)(3).The invasion in 1993 almost made Sandy lose h

    16、er job.(分数:2.50)(4).Exhaustion and fear prevented Sandy from participating in rec. pets. cats.(分数:2.50)(5).To some degree, the wars in cyberspace are mostly related to culture.(分数:2.50)(6).The message posted was fake, whose purpose was to irritate the members of the group.(分数:2.50)(7).When Sandy try

    17、ing protecting someone else, she was noticed and attacked.(分数:2.50)(8).Mischievous mentality indulges certain people with abuse of their power in the virtual world.(分数:2.50)(9).When Sandy found herself under investigation by her own company, she was irritated.(分数:2.50)(10).Sandy wrote to the police

    18、when she failed to persuade him not to kill the cat.(分数:2.50)Preparing for Computer DisastersSummary A. When home office computers go down, many small businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimizing their effects is quite straightforward. B. Fires, powe

    19、r surges, and floods, they“re all facts of life. We read about them in the morning paper and see them on the evening news. We sympathize with the victims and commiserate over their bad luck. We also shake our heads at the digital consequencesmelted computers, system failures, destroyed data. Yet, so

    20、mehow, many of us continue to live by that old mantra of denial: “It won“t happen to me.“ Well, the truth is, at some point you“ll probably have to deal with at least one disaster. That“s just how it goes, and in most aspects of our lives we do something about it. We buy insurance. We stow away prov

    21、isions. We even make disaster plans and run drills. But for some reason, computer disaster recovery is a blind spot for many of us. It shouldn“t be. Home computers contain some of our most important information, both business and personal, and making certain our data survives a disaster should be a

    22、priority. Moreover, even the smallest disaster can be a serious disruption. Personal computers have become an integral part of the smooth-running household. We use them to communicate, shop, and do homework, and they“re even more vital to home office users. When home office computers go down, many s

    23、mall businesses grind to a halt. Fortunately, taking steps to recover from disasters and minimize their effects is quite straightforward. With a good offsite storage plan and the right tools, you can bounce back quickly and easily from minor computer disasters. And, should a major calamity strike, y

    24、ou can rest assured your data is safe. Offsite Storage: Major DisastersC. House fires and floods are among the most devastating causes of personal computer destruction. That“s why a solid offsite backup and recovery plan is essential. Although many home users faithfully back up their hard drives, ma

    25、ny would still lose all their data should their house flood our burn. That“s because they keep their backups in relatively close to their computers. Their backup disks might not be in the same room as their computerstucked away in a closet or even the garagebut they“re not nearly far enough away sho

    26、uld a serious disaster strike. So, it“s important to back up your system to a removable medium and to store it elsewhere. D. There are many ways to approach offsite storage. It starts with choice of backup tools and storage medium. Disaster situations are stressful, and your recovery tools shouldn“t

    27、 add to that stress. They must be dependable and intuitive, making it easy to schedule regular backups and to retrieve files in a pinch. They must also be compatible with your choice of backup medium. Depending on your tools, you can back up to a variety of durable disk typesfrom CDs to Jaz drives t

    28、o remote network servers. Although many of these storage media have high capacity, a backup tool with compression capabilities is a big plus, eliminating the inconvenience of multiple disks or large uploads. E. Once you select your tools and a suitable medium, you need to find a remote place to stor

    29、e your backups. The options are endless. However, no matter where you choose, be sure the site is secure, easily accessible, and a good distance away from your home. You may also want to consider using an Interact-based backup service. More and more service providers are offering storage space on th

    30、eir servers, and uploading files to a remote location has become an attractive alternative to conventional offsite storage. Of course, before using one of these services, make certain you completely trust the service provider and its security methods. Whatever you do, schedule backups regularly and

    31、store them far away from your home. Come What May: Handling the Garden Variety Computer CrisisF. Not all home computer damage results from physical disaster. Many less menacing problems can also hobble your PC or destroy your information. Systems crash, kids “rearrange“ data, adults inadvertently de

    32、lete files. Although these events might not seem calamitous, they can have serious implications. So, once again, it“s important to be prepared. As with physical disasters, regular backups are essential. However, some of these smaller issues require a response that“s more nuanced than wholesale backu

    33、p and restoration. To deal with less-than-total disaster, your tool set must be both powerful and agile. For example, when a small number of files are compromised, you may want to retrieve those files alone. Meanwhile, if just your settings are affected, you“ll want a simple way to roll back to your

    34、 preferred setup. Yet, should your operating system fail, you“ll need a way to boot your computer and perform large-scale recovery. Computer crises come in all shapes and sizes, and your backup and recovery tools must be flexible enough to meet each challenge. The Right Tools for the Right Job: Gear

    35、ing up for DisasterG. When disaster strikes, the quality of your backup tools can make the difference between utter frustration and peace of mind. Symantec understands this and offers a range of top quality backup and recovery solutions. Norton GoBack is the perfect tool for random system crashes, f

    36、ailed installations, and inadvertent deletions. With this powerful and convenient solution, it“s simple to retrieve overwritten files or to bring your system back to its pre-crash state. Norton Ghost is a time-tested home office solution. Equipped to handle full-scale backups, it“s also handy for cl

    37、oning hard drives and facilitating system upgrades. A favorite choice for IT professionals, it“s the ideal tool for the burgeoning home office. You can buy Norton Ghost and Norton GoBack separately, or get them both when you purchase Norton System Works. H. Life“s disasters, large and small, often c

    38、atch us by surprise. However, with a little planning and the right tools, you can reduce those disasters to bumps in the road. So, don“t wait another day. Buy a good set of disaster recovery tools, set up an automatic backup schedule, and perform a dry run every now and again. Then, rest easy.(分数:25

    39、.00)(1).It“s necessary for us to back up our systems to some transferable medium and to put it somewhere else.(分数:2.50)(2).Not all damage of your computer caused by physical disaster.(分数:2.50)(3).The quality of your backup tools determines whether you are frustrated or have a peaceful mind when disa

    40、ster strikes.(分数:2.50)(4).For some reason, computer disaster recovery is always ignored by many of us.(分数:2.50)(5).Taking steps to recover from computer disasters can minimize bad effects.(分数:2.50)(6).House fires and floods are the most devastating causes of personal computer destruction.(分数:2.50)(7

    41、).With a good offsite storage plan and the right tools, you can bounce back quickly in minor computer disasters.(分数:2.50)(8).Preparation for computer disasters should do from time to time.(分数:2.50)(9).Backup and recovery tools must be flexible enough to deal with various computer crises.(分数:2.50)(10

    42、).You should find a distant place to store your backups after selecting your tools and a suitable medium.(分数:2.50)Why Drug Testing Is NeededA. The illicit drug trade in America has fast become a $110 billion annual business. According to the Research Triangle Institute, A North Carolina-based resear

    43、ch organization, drug abuse cost the U.S. economy $60 billion in 1983, nearly a 30 percent increase from the more than $47 billion estimated for 1980. B. No one seriously disputes that drug abuse in the workplace is a serious and growing problem for both public and private employers. Increasingly, t

    44、he problem continues to contribute to the high rate of employee absenteeism, rising health care costs, a high rate of accidents, and the low productivity of our work force. It has been aptly called an American tragedy. C. The possibility of protests within certain shops also exists. Job actions not

    45、for more pay but to be a free citizen at work could put some heat on certain company officials. D. Take the Los Angeles Times . Its editorial page has been among the most forceful and lucid in the nation in fighting to keep the Bill of Rights in working order. Yet, according to Daniel Jussim, writin

    46、g in the ACLU“s Civil Liberties newsletter, The “ Los Angeles Times , though its director of employee relations says there“s no particular drug problem at his newspaper, recently adopted a mandatory urinalysis program “to stay current with what other employers are doing.“ E. Imagine the impact in Lo

    47、s Angeles if Anthony Day, the civil libertarian who is editor of the Los Angeles Times “ editorial page, were to lead a picket line outside the paper with such signs as: JAMES OTIS, FATHER OF THE FOURTH AMENDMENT, FOUGHT BRITISH GENERAL SEARCH WARRANTS ON BEHALF OF WORKING PEOPLENOT JUST PUBLISHERS.

    48、 F. The need for alliances to preserve what“s left of privacy grows greater by the day. Charles Seabrook writes of new tests that can “detect the presence of the abnormal levels of chemicals found in patients with severe depression, schizophrenia, and manic-depression.that can detect chemical “marke

    49、rs“ that may mean a person is at high risk of developing diabetes, arthritis, or cancer.That can screen for more than 150 genetic disease, including sickle cell anemia.and cystic fibrosis.“ G. Would an employer hire someone who is at risk of developing cancer? Should an employer have access to such private information? H. On a more modest level, a new test developed by Werner Baumgartner, a Los Angeles chemist, bypasses such old-time procedures as requiring the random suspect to urinate into a cup or bottle. The new test uses radiation on hair and discloses not only what drugs have been


    注意事项

    本文(大学英语四级分类模拟题337及答案解析.doc)为本站会员(appealoxygen216)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开