欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    高等院校英语入学分级测试三级分类模拟题6及答案解析.doc

    • 资源ID:1458744       资源大小:114.50KB        全文页数:19页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    高等院校英语入学分级测试三级分类模拟题6及答案解析.doc

    1、高等院校英语入学分级测试三级分类模拟题 6 及答案解析(总分:100.00,做题时间:90 分钟)一、Two Fast Reading(总题数:1,分数:20.00)Internet HackingTwo years ago, a fifteen-year-old boy logged onto the Internet under the alias (别名) “Comrade“. To some of us, our idea of hacking might include breaking into an email account or viewing confidential(机密

    2、的) company information. However, no one expected that “Comrade“ would cause a three-week shutdown at NASA, steal government email passwords, intercept over 3000 emails and download close to $ 2 million worth of software used to operate the international space station. If that was not shocking enough

    3、, he had twice gained access to the computers used by the Pentagon to monitor threats of nuclear and biological warfare. Computer hacking has been around for as long as we can remembercertainly as long as we have had a World Wide Web. Occasionally, the news speaks of silly pranks which imply nothing

    4、 more than a temporary shutdown of a website, although “Comrade“ hack forced a three-week shutdown for repairs and cost the U.S. government $ 41,000. Recently, the case of the hackers tampering with(损害,影响) the CIA“s website, changing the title to “Central Stupidity Agency“ and filling it with obscen

    5、ities was merely a nuisance for the agency. It posed no real threat because the CIA“s files are inaccessible via that Interact site. Undoubtedly, there are some who see humour in thisa civilian, probably not even a professional, outwitting an elite US agency. No Laughing Matter There are more seriou

    6、s crimes, which are no laughing matter. In one case of corporate espionage(间谍活动), two “heavy manufacturing“ firms were bidding on a $ 900 million contract ; one outbid the other by a fraction of a percent. This was no co-incidence as the losing company later discovered that someone had broken into t

    7、he company“s computer network and accessed files that contained bidding strategy information. In another case, authorities are chasing an individual who regularly hires U.S. teens to access confidential documents. One young hacker was paid $1,000-and promised $10,000 morefor stealing design document

    8、s for kitchen appliances from U.S. firms. Beyond selling the trade secrets to a company“s competition, some hackers resort to extortion(敲) of the company. In Sweden, a 15 and 17 year old tried to extort $ 2 million from a cellular company to destroy information they had illegally downloaded. Like mo

    9、st eases of extortion, the criminal“s identity is especially difficult to trace and is magnified because of the nature of the Net. When the Internet was gaining immense popularity, businesses were scrambling(争抢) to secure domain names and using the technology to expand their market. Seeing e-commerc

    10、e as an untapped goldmine, many were eagerly diving headfirst into a slew of (许多) problems, including security breaches. Companies like eBay, B, Yahoo, Amazon and Excite were not prepared when “Mafiaboy“ decided to strike. The 16-year-old Montreal teen crippled their sites last year when he bombarde

    11、d them with thousands of simultaneous messages, preventing legitimate users from gaining access. His five-day tirade(长篇大论) caused an estimated $1.7 billion in damages. These malicious and insidious(隐伏的) attacks threaten security and cost companies and organizations billions of dollars. A survey of t

    12、he Fortune 1000 companies in 1999 estimates a loss of $ 45 billion from information theft. Counter Strategies Many organizations are taking extra security measures, including the usage of firewalls (a security mechanism that allows limited access to sites from the Internet). Still, hackers will gain

    13、 access. If a fifteen-year-old can shutdown NASA, what hope is there? Recently, Ernst the proverbial David struggling against a corporate Goliath. In many of these crimes, people do them to defy corporations or the government; money is not always the motive. However, it is an act that is still unacc

    14、eptable that victimizes all who use the Internet. Viruses, shutdowns, crashes and email hacking will be the burden of the user, a company“s money lost to theft will be the burden of its customers and a government“s money spent on security will be the burden of its citizens. Is there anyone not affec

    15、ted by Internet crime? Nope.(分数:20.00)(1).Which of the following about “Comrade“ is true?(分数:2.00)A.He is a middle-aged man.B.He caused a three-week shutdown at the Pentagon.C.He stole government email passwords.D.He downloaded nearly $ 3 million worth of software.(2).Hacking into the CIA“s website

    16、posed no real threat because -|_|-.(分数:2.00)A.The files have already been destroyed on purpose.B.The files are inaccessible via that Internet site.C.The files are very difficult to read.D.The files have been transferred to a safe place.(3).In one case of corporate espionage, the losing company later

    17、 discovered that -|_|-.(分数:2.00)A.their computer network had been badly damagedB.someone had replaced their computersC.they lost by a fraction of a percentD.someone had accessed their bidding strategy information(4).Who are the U.S. authorities chasing?(分数:2.00)A.Someone who regularly hires teens to

    18、 access secret documents.B.Someone who escapes from the prison.C.Someone who evades a huge sum of taxes.D.Someone who breaks into bank accounts to steal money.(5).In Sweden, two teenagers tried to extort -|_|- from a cellular company to destroy their illegally downloaded information.(分数:2.00)A.2 mil

    19、lion dollarsB.3 million dollarsC.4 million dollarsD.5 million dollars(6).Which of the following about “Mafiaboy“ is true?(分数:2.00)A.He is a 16-year-old American boy.B.He bombarded companies sites like eBay with thousands of simultaneous messages.C.He prevented illegitimate users from gaining access.

    20、D.His attack caused an estimated MYM1.7 million in damages.(7).Ernst one outbid the other by a fraction of a percent. This was no co-incidence as the losing company later discovered that someone had broken into the company“s computer network and accessed files that contained bidding strategy informa

    21、tion. In another case, authorities are chasing an individual who regularly hires U.S. teens to access confidential documents. One young hacker was paid $1,000-and promised $10,000 morefor stealing design documents for kitchen appliances from U.S. firms. Beyond selling the trade secrets to a company“

    22、s competition, some hackers resort to extortion(敲) of the company. In Sweden, a 15 and 17 year old tried to extort $ 2 million from a cellular company to destroy information they had illegally downloaded. Like most eases of extortion, the criminal“s identity is especially difficult to trace and is m

    23、agnified because of the nature of the Net. When the Internet was gaining immense popularity, businesses were scrambling(争抢) to secure domain names and using the technology to expand their market. Seeing e-commerce as an untapped goldmine, many were eagerly diving headfirst into a slew of (许多) proble

    24、ms, including security breaches. Companies like eBay, B, Yahoo, Amazon and Excite were not prepared when “Mafiaboy“ decided to strike. The 16-year-old Montreal teen crippled their sites last year when he bombarded them with thousands of simultaneous messages, preventing legitimate users from gaining

    25、 access. His five-day tirade(长篇大论) caused an estimated $1.7 billion in damages. These malicious and insidious(隐伏的) attacks threaten security and cost companies and organizations billions of dollars. A survey of the Fortune 1000 companies in 1999 estimates a loss of $ 45 billion from information thef

    26、t. Counter Strategies Many organizations are taking extra security measures, including the usage of firewalls (a security mechanism that allows limited access to sites from the Internet). Still, hackers will gain access. If a fifteen-year-old can shutdown NASA, what hope is there? Recently, Ernst th

    27、e proverbial David struggling against a corporate Goliath. In many of these crimes, people do them to defy corporations or the government; money is not always the motive. However, it is an act that is still unacceptable that victimizes all who use the Internet. Viruses, shutdowns, crashes and email

    28、hacking will be the burden of the user, a company“s money lost to theft will be the burden of its customers and a government“s money spent on security will be the burden of its citizens. Is there anyone not affected by Internet crime? Nope.(分数:20.00)(1).Which of the following about “Comrade“ is true

    29、?(分数:2.00)A.He is a middle-aged man.B.He caused a three-week shutdown at the Pentagon.C.He stole government email passwords. D.He downloaded nearly $ 3 million worth of software.解析:解析 依据关键词 Comrade 定位到第一段。(2).Hacking into the CIA“s website posed no real threat because -|_|-.(分数:2.00)A.The files have

    30、 already been destroyed on purpose.B.The files are inaccessible via that Internet site. C.The files are very difficult to read.D.The files have been transferred to a safe place.解析:解析 依据关键词 CIA“s website 定位到第四段最后一句话,答案意为“通过那个网站无法获取文件”。(3).In one case of corporate espionage, the losing company later d

    31、iscovered that -|_|-.(分数:2.00)A.their computer network had been badly damagedB.someone had replaced their computersC.they lost by a fraction of a percentD.someone had accessed their bidding strategy information 解析:解析 依据关键词 corporate espionage, the losing company 定位到第一个小标题下第二段,答案意为“有人获取了他们的投标策略信息”。(4

    32、).Who are the U.S. authorities chasing?(分数:2.00)A.Someone who regularly hires teens to access secret documents. B.Someone who escapes from the prison.C.Someone who evades a huge sum of taxes.D.Someone who breaks into bank accounts to steal money.解析:解析 依据关键词 U.S. authorities 定位到第一个小标题下第三段,答案意为“定期雇佣青少

    33、年获取机密文件的人”。(5).In Sweden, two teenagers tried to extort -|_|- from a cellular company to destroy their illegally downloaded information.(分数:2.00)A.2 million dollars B.3 million dollarsC.4 million dollarsD.5 million dollars解析:解析 依据关键词 Sweden 定位到第一个小标题下第四段。(6).Which of the following about “Mafiaboy“ i

    34、s true?(分数:2.00)A.He is a 16-year-old American boy.B.He bombarded companies sites like eBay with thousands of simultaneous messages. C.He prevented illegitimate users from gaining access.D.His attack caused an estimated MYM1.7 million in damages.解析:解析 依据关键词 Mafiaboy 定位到第一个小标题下第七段,答案意为“他用上千条同步信息轰炸像 e

    35、Bay 这样的公司网址”。(7).Ernst & Young set up computer labs to allow -|_|- to perform “ethical hacks“.(分数:2.00)A.government officialsB.the staff of its clientsC.information security consultants D.teenage hackers解析:解析 依据关键词 Ernst & Young 定位到第二个小标题下第三段。(8).With the Internet gaining immense popularity, busines

    36、ses scramble to 1 to expand their market.(分数:2.00)解析:secure domain names and using the technology解析 依据关键词 immense popularity, scramble 定位到第一个小标题下第六段。(9).A survey of the Fortune 1000 companies in 1999 estimates a loss of $ 45 billion from 1.(分数:2.00)解析:information theft解析 依据题干中的数字定位到第一个小标题下第八段最后一句话。(

    37、10).The “computer geek“ culture is 1 as cynical and often self-righteous.(分数:2.00)解析:portrayed on television and in movies解析 依据关键词 computer geek 定位到最后一个小标题下第一段第二句。二、Cloze(总题数:0,分数:0.00)三、Section A(总题数:1,分数:20.00)Perhaps like most Americans you have some extra pounds to 1 . You may even have tried a

    38、fad diet or two, but found yourself right back where you started. The key to weight loss is regular 2 activity. And surprisingly, you don“t have to give up eating or make the gym your second home to see long-term, 3 effects. You body needs a certain amount of energy to maintain basic 4 such as breat

    39、hing, blood circulation and digestion. The energy required to keep your organs functioning is referred to as the resting or basal metabolic rate. Any time you are active, 5 energy is required. It is obtained from glycogen and fat stored in the blood, liver, and muscles. The key to losing weight is t

    40、o draw on the fat rather than on the carbohydrate reserves. Which of the two energy sources you use depends on the intensity and 6 of your activity. The higher the intensity, the more your body will pull from the stored carbohydrates. The lower the intensity, the more your body will 7 on fat as its

    41、fuel. Aerobic exercise is most 8 for weight loss. When you perform aerobic activities you 9 contract large muscle groups such as your legs and arms. Walking, running, rollerblading, swimming, dancing, and jumping jacks are all forms of aerobic activity. Surprisingly, if your aerobic activity is low

    42、to moderately intense and of long duration, you will burn more fat than if you had 10 in a short burst of high-intensity exercise. In short, a brisk 30-minute walk will burn fat while a 100-yard sprint will burn glycogen. A. positive B. additional C. duration D. effective E. shed F. physical G. food

    43、 H. functions I. participated J. rely K. cut L. repeatedly M. uses N. little O. obvious(分数:20.00)解析:E解析 该空需填入动词原形,结合原意“和大多数美国人一样,你(的体重)可能也有几磅需要 -|_|-”可知,E(去除)最符合文意。解析:F解析 此处缺少形容词修饰 activity,结合常识和下文可知,减肥应该通过身体锻炼才有成效,F 最符合文意。解析:A解析 结合句意“令人惊奇的是,为了看到长期 -|_|-效果你不必节食或常去健身馆”,可知空格处需填一形容词,初选后留下 A、D。由于下文只是讲到运

    44、动会帮助减肥,但并未说明它的效果明显,所以此处宜选用意思上更宽泛的 positive(正面的,有效的)。解析:H解析 下文举例的 breathing, blood circulation and digestion 都是人体的基本功能,且其后的 functioning 已给出了提示,故 H 最符合文意。解析:B解析 该空需填入形容词,结合常识和句意“任何时候只要你活动,你都需要 -|_|-能量”来看选项,B(额外的)符合文意。解析:C解析 该句句意为“采用这两种能量消耗来源中的哪一种取决于你活动的强度和 -|_|-”,结合下文提到的“.low to moderately intense and

    45、 of long duration.”可知 C 最符合文意。解析:J解析 结合句意“(活动的)强度越低,身体越 -|_|-于脂肪作为其燃料”,该空应填入能和 on 搭配的动词,J 最符合文意。解析:D解析 结合常识可知,有氧运动是最有效的减肥方式,选项中 D 最符合文意。解析:L解析 该空需填入副词,选项中只有 L 和 N 可作副词,由下文提到的 walking, running, swimming, dancing, and jumping 等可推知在这些有氧运动中四肢的活动是反复的,故排除 N。解析:I解析 该空需填入动词的过去分词,结合句意“如果你已经 -|_|-高强度、爆发性的运动,你

    46、会燃烧更多的脂肪”可知 I 最符合文意。四、Section B(总题数:1,分数:30.00)Even today in the modern, developed world, surveys show that parents still prefer to have a boy rather than a girl. One longstanding reason why boys have been 1 as a greater blessing has been that they arc 2 to become better economic providers 3 their p

    47、arents“ old age. Yet it is time for parents to 4 again. Girls may now be a better investment. Girls get better 5 at school than boys, and in most developed countries more women than men go to 6 Women will thus be better 7 for the new jobs of the 21st century, in which brains 8 a lot more than physic

    48、al strength. In Britain far more women than men are now 9 to become doctors. And women are more 10 to provide sound advice on investing their parents“ nest egg. Surveys show that women consistently 11 higher financial returns than men do. 12 , the increase in female employment in the rich world has

    49、been the main 13 force of growth in the past couple of decades. Those women have 14 more to global GDP growth than have either new technology or the new giants, China and India. Add the 15 of housework and child-rearing, and women probably account 16 just over half of the world output. It is 17 that women still get paid less and few 18 it t


    注意事项

    本文(高等院校英语入学分级测试三级分类模拟题6及答案解析.doc)为本站会员(sofeeling205)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开