[外语类试卷]国家公共英语四级(综合)练习试卷41及答案与解析.doc
《[外语类试卷]国家公共英语四级(综合)练习试卷41及答案与解析.doc》由会员分享,可在线阅读,更多相关《[外语类试卷]国家公共英语四级(综合)练习试卷41及答案与解析.doc(17页珍藏版)》请在麦多课文档分享上搜索。
1、国家公共英语四级(综合)练习试卷 41及答案与解析 Part B Directions: Read the following four texts. Answer the questions below each text by choosing A, B, C or D . Mark your answers on ANSWER SHEET 1. 0 Software piracy problems exist and have been exacerbated in recent years due to IS overload, decentralized purchasing, bu
2、dget constraints, general user and corporate management attitudes, lack of knowledge of the copyright laws, and now Internet access. Most organizations have not managed their software very effectively. Determining the extent of the problem is a time-consuming process. The industrys response has been
3、 to form trade associations to educate the public about the copyright law and to aggressively pursue pirates. Some of the largest PC companies have set up their own in-house programs to combat the problem. Corporate exposure is increasing due to the need to manage more machines, software and on-line
4、 and Internet access. Civil and criminal penalties for copyright infringement have stiffened. As a result, trade association resources have increased significantly as well as calls to hotlines from unhappy employees due to corporate downsizing. When infringing software is reported, the company is at
5、 risk of embarrassing litigation for copyright infringement. The company will most probably lose as the copyright holder usually has a “smoking gun“ based on reports from former employees or other whistle blowers. There is also the simple fact that no matter how hard the IS staff try, there are and
6、always will be copies of software programs that cannot be validated by purchasing records. They come in from home, are created by otherwise conscientious employees trying to get their jobs done or just unauthorized copies by purchasing records. They come in unauthorized copies created by cost consci
7、ous managers and employees. Internet access only increases these problems as software is downloaded from sites worldwide. A software management program will reduce the risks from using counterfeit or copied software and help avoid damage from viruses and corrupt programs. By conducting an audit befo
8、re infringement is reported the corporation will reduce its exposure. It is easy to inventory software programs on any particular machine. However, matching the software to the licensing documents is no easy task. Interpreting the variety of software licenses takes familiarity with industry business
9、 and licensing practices. Networks make the task much more complex. Internet access compounds the problem. Employers should set guidelines for when and how to download software and data from on-line services and the Internet. Most software vendors maintain on-line support and provide the ability to
10、download bug fixes and program updates. However, one bad virus can wreak havoc throughout a companys networks and shut down the whole system. Firewall technology that controls access to and from outside systems can help. Information systems staff should work with management to develop policies that
11、reduce risk but reflect the level of openness that suits a particular companys corporate culture. 1 This passage aims at providing advice to _. ( A) software companies ( B) business companies ( C) lawmakers ( D) corporate employees 2 What is the role of Internet in software piracy? ( A) It is a weap
12、on against software piracy. ( B) It is an accessory to software piracy. ( C) It is the most important cause of software piracy. ( D) It has nothing to do with software piracy. 3 “Smoking gun“ in the fourth paragraph means _. ( A) reports from former employees ( B) irrefutable evidence ( C) debtor (
13、D) trade associations 4 The author believes that _. ( A) an audit before infringement will solve the problem of corporate exposure to software piracy ( B) employees should be encouraged to bring software from home ( C) virus can be downloaded from the Internet ( D) software licenses are all similar
14、5 The author advises information systems staff to work with management in making policies because _. ( A) they are in charge of making policies ( B) they are responsible for avoidance of software piracy ( C) they are familiar with the companys corporate culture ( D) they are frequently the actual wr
15、ong-doers 5 The more time scientists spend designing computers, the more they marvel at the human brain. Tasks that stump the most advanced supercomputer-recognizing a face, reading a handwritten note-are childs play for the 3-lb. organ. Most important, unlike any conventional computer, the brain ca
16、n learn from its mistakes. Researchers have tried for years to program computers to imitate the brains abilities, but without success. Now a growing number of designers believe they have the answer: if a computer is to function more like a person and less like an over-grown calculator, it must be bu
17、ilt more like a brain, which distributes information across a vast interconnected web of nerve cells, or neurons. Conventional computers function by following a chainlike sequence of detailed instructions. Although very fast, their processors can perform only one task at a time. This approach works
18、best in solving problems that can be broken down into simpler logical pieces. The processors in a neural-network computer, by contrast, form a grid much like the nerve cells in the brain. Since these artificial neurons are interconnected, they can share information and perform tasks at the same time
19、. This two-dimensional approach works best at recognizing patterns. Instead of programming a neural-network computer to make decisions, its maker trains it to recognize the patterns in any solution to a problem by repeatedly feeding examples to the machine. This process is like a process that prepar
20、es all possible moves in a chess game and try to find a best approach to it. If the examples are not sufficient or complete, the computer will be in for trouble, after all, it can not respond to something it can not recognize as a pattern in its memory. Neural networks come in all shapes and size. T
21、he new networks will make things which were simply impossible completely feasible in the near future. What the users need to do is to wait and see. Developers are experimenting with new equipment and hopefully they will succeed. Until now most existed as software simulations because redesigning comp
22、uter chips took a lot of time and money. By experimenting with different approaches through software rather than hardware, scientists have been able to avoid costly mistakes. 6 What does the word “stump“ in paragraph 1, line 2, mean? ( A) Catch. ( B) Baffle. ( C) Please. ( D) Force. 7 It can be infe
23、rred from the first paragraph that the most advanced supercomputer _. ( A) can recognize a face and read a handwritten note ( B) can learn from the past ( C) cannot fail to imitate the human brains abilities ( D) cannot distribute information across all interconnected web of nerve cells 8 The main f
24、eature of a neural-network computer is that _. ( A) its processors net is an interconnected web of neurons ( B) it is programmed to make decisions ( C) its networks are of all shapes and sizes ( D) its neurons are artificial 9 According to the passage, the expression “this two-dimensional approach“
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外语类 试卷 国家 公共 英语四 综合 练习 41 答案 解析 DOC
