[外语类试卷]大学英语四级模拟试卷508及答案与解析.doc
《[外语类试卷]大学英语四级模拟试卷508及答案与解析.doc》由会员分享,可在线阅读,更多相关《[外语类试卷]大学英语四级模拟试卷508及答案与解析.doc(35页珍藏版)》请在麦多课文档分享上搜索。
1、大学英语四级模拟试卷 508及答案与解析 一、 Part I Writing (30 minutes) 1 For this part, you are allowed 30 minutes to write a composition based on the topic “On Interview“. You must write at least 120 words, and base your composition on the outline given in Chinese below. Remember to write clearly. 1. 面试是如今社会上招聘人才的主要手
2、段 ; 2. 面试的意义; (为什么要面试,面试有什么好处 ?) 3. 如何成功地通过面试。 On Interview 二、 Part II Reading Comprehension (Skimming and Scanning) (15 minutes) Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions attached to the passage. For questions 1-7, mark: Y (for YES) i
3、f the statement agrees with the information given in the passage; N (for NO) if the statement contradicts the information given in the passage; NG (for NOT GIVEN) if the information is not given in the passage. 1 The Internet In November 2005, thousands of government representatives and information
4、experts met in Tunis, Tunisia to discuss the future of the Internet. The United Nations organized the World Summit on the Information Society to discuss Internet growth in developing nations. But the three-day meetings also developed into a struggle over who controls the Internet. The Internet grew
5、out of research paid for by the United States Defense Department in the 1960s and 1970s. As a result, the United States government still has .some control over it. In 1998, the Commerce Department set up a non-profit organization to supervise the domain name system of the Internets World Wide Web. T
6、he Web is a major service on the Internet. The group, based in California, is called the Internet Corporation for Assigned Names and Numbers, or ICANN. A domain name is a series of words separated by dots. It identifies an Internet Web site. ICANN operates a list of Web site owners and approves new
7、endings for Web addresses, such as dot-com, dotnet or dot-gov. The group guarantees that Internet users around the world do not visit different Websites using the same Web address. For example, thanks to ICANN, a person in Cuba will see the same www. unsv. com Website as someone in Belarus. ICANN al
8、so has some Internet policy powers. It can remove Web sites from the Internet. It also decides who can sell and list domain names. The European Onion, China, Brazil, India and other countries want the United States to release at least some control over the World Wide Web. They believe that the Inter
9、net is an international resource that should be supervised by the United Nations or some other independent organization. The Bush Administration disagrees. It says that ICANN is the best way to guarantee an open, secure and dependable online environment. Heavy governmental controls, it says, would s
10、uppress Internet growth and development. Hours before the start of the Tunis conference, negotiators agreed to leave day-to-day supervision of the Internet with ICANN. The compromise proposal from the European Union calls for the creation next year of an international governance committee. Governmen
11、ts, businesses and organizations will be able to discuss public policy issues, including Internet crime, junk mail and viruses. The committee, however, will not have powers to make rules. The World Future Society estimated last year, the year of 2004, that about 950 million people around the world w
12、ere using the Internet. That number is expected to rise to more than 1,000 million people within the next two years. Most Internet communication is business-to-business, instead of personal electronic mail. Buying and selling goods and services over the Internet is growing around the world. The Worl
13、d Future Society estimates that 2.7 million million dollars was earned through Internet commerce in 2004.But, there are risks involved with this e-commerce. For example, the Federal Trade Commission estimates that more than 52,000 million dollars in goods and services were purchased last year throug
14、h identity theft. Identity thieves steal personal information from Americans. They collect Social Security numbers, banking records and telephone numbers. They use this information to request loans, or to get credit cards in the name of the victim. Identity thieves often use computer viruses to coll
15、ect a victims personal information. They may also use spyware. These are programs that are loaded onto a computer without the owners knowledge. Spyware follows the computer users online activities. Identity thieves also use another method called Internet “phishing.“ These e-mail messages attempt to
16、collect an Internet users personal information, such as credit card numbers, by acting like a real business. People can protect themselves from identity theft in several ways. Anti-virus and anti-spyware computer programs can help. So can firewalls. These are programs or devices that limit informati
17、on coming through an Internet connection. Banks and individuals can also use Fob technology. A fob is a small device connected to a computer. Every sixty seconds it creates a special series of numbers, or a code. A computer user must type the code created at the exact minute that the user wants to s
18、ee his or her online financial information or bank records. Advertisers interested in selling products over the Internet may use adware to identify possible buyers. Adware is a software program sent with free files or programs to a computer. Once loaded onto a computer, adware can collect informatio
19、n about a persons interests. Adware can use this information to provide targeted sales messages to the computer user. These unwanted sales messages are sent through a persons e-mail. They can also be a problem for people using an Internet browser to find information. In this case, pop-up blockers ca
20、n help. A pop-up blocker is a computer program that prevents unwanted sales messages from opening. One of the most popular kinds of communication on the Internet is through personal Web sites called blogs. Blog is a shortened name for a Web log. Anyone can create his or her own blog. A blog may cont
21、ain stories, pictures, links to other Web sites and comments from visitors. Some people add information to their blogs every day. Blogs offer a way to present news and political or personal information. Blogs have become a place for public expression on many subjects. The Blog Herald estimates that
22、there are more than 60 million blogs around the world. People who have blogs are called bloggers. In the United States, many well known people have blogs. So do many other Americans, including teenagers and college students. Even United States soldiers serving in Iraq and Afghanistan are blogging. T
23、roops are using their mailblogs to share opinions, emotions and memories of lost soldiers. The United States military restricts troops from writing personal information about other soldiers. It also restricts operational security information from being published in a biog. You can find blogs about a
24、 subject by using a special search engine created by Google. The Web address is blogsearch, google, com. Google is one of the most popular “search engines“ for the Internet. People use a search engine to find information about almost any subject on the Web. There are many ways to link computers with
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外语类 试卷 大学 英语四 模拟 508 答案 解析 DOC
