收藏 分享(赏)

2016年12月大学英语四级真题第一套.doc

上传人:精品资料 文档编号:10482589 上传时间:2019-11-21 格式:DOC 页数:16 大小:30.54KB
下载 相关 举报
2016年12月大学英语四级真题第一套.doc_第1页
第1页 / 共16页
2016年12月大学英语四级真题第一套.doc_第2页
第2页 / 共16页
2016年12月大学英语四级真题第一套.doc_第3页
第3页 / 共16页
2016年12月大学英语四级真题第一套.doc_第4页
第4页 / 共16页
2016年12月大学英语四级真题第一套.doc_第5页
第5页 / 共16页
点击查看更多>>
资源描述

1、2016年 12月英语四级真题(第一套)新东方在线Part I Writing (30minutes)(请于正式开考后半小时内完成该部分,之后将进行听力考试)Directions:For this part, you are allowed 30 minutes to write an essay .Suppose you are two options upon graduation: one is to take a job in a company and the other to go to a graduate school. You are to make a choice bet

2、ween the two. Write an essay to explain the reasons for your choice. You should write at least 120 words but no more than 180 words.Part II Listening Comprehension (25 minutes)Section ADirections: In this section, you will hear three news reports. At the end of each news report, you will hear two or

3、 three questions. Both the news report and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A), B), C). Then mark the corresponding letter on the Answer sheet1with a single line through the centre.Questions 1and 2 are bas

4、ed on the news report you have just the heard.1. A) It was going to be renovated. C) It was dangerous to live in. B) He could no longer pay the rent. D) He had sold it to the royal family.2. A) A storm. C) A forest fire.B) A strike. D) A Terrorist attack.Questions 3and 4 are based on the news report

5、 you have just heard.3. A) They lost contact with the emergency department.B) They were injured by suddenly falling rocks.C) They sent calls for help via a portable radio. D) They were trapped in an underground elevator.4. A) They provided the miner with food and water.B) They sent supplies to keep

6、the miners warm.C) They released the details of the accident.D) They tried hard to repair the accident.Question5 to7 are based on the news report you have just heard.5. A) Raise postage rates. C) Close some of its post offices.B) Improve its services. D) Redesign delivery routes.6. A) Closing office

7、s on holidays. C) Computerizing mail sorting processes. B) Shortening business hours. D) Stopping mail delivery on Saturdays.7. A)A lot of controversy will ariseB) Taxpayers will be very pleasedC) Many people will begin to complainD) Many post office staff will lose their jobsSection BDirections:In

8、this section,you will hear two long conversations.At the end of eachconversation,you will hear four questions. Both the conversation and the questions will be spoken only once. After you hear a question, you must choose the best answer from four choice marked A),B),C) and D).Then mark the correspond

9、ing letter an Answer sheet1 with a single line though the centre. Question8 to 11 are based on the conversation you have just heard.8. A)He will lose part of his pay. C)He will be given a warning.B)He will go through retraining. D)He is go good terms with his workmates.9. A)He is an experienced pres

10、s operator. C)He is always on time.B)He is trustworthy guy. D)He is go good terms with his workmates.10. A)She is a trade union representative. C)She is better at handing such matters.B)She is a senior manager of the shop. D)She is in charge of public relation.11. A)He is always trying to stir up tr

11、ouble.B)He is skilled and experienced.C)He is very close to the manager.D)He is always complaining about low wages.Question12 to 15 are based on the conversation you have just heard.12. A)Open. C)Selfish.B)Reserved. D)Friendly.13. A)They read a book. C)They stay quiet.B)They talk about the weather D

12、)They chat with fellow passengers.14. A)She was unwilling to make friends with workmates.B)She was never invited to a colleagues home.C)She was eager to visit an English castle.D)She was always treated as a foreigner.15.A) House are much more quiet. C) They want a garden of their own.B) They want to

13、 have more space. D) Houses provide more privacy.Section CDirections:In this section,you will hear three passages.At the end of each passage,you will hear three or four questions.Both the passage and the questions will be spoken only once.After you hear a question,you must choose the best answer fro

14、m the four choices marked A),B),C) and D).Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Questions 16 to 18 are based on the passage you have just heard.16.A) They will automatically be given hiring priority.B) They dont have to go through job interviews.C

15、) They are likely to get much higher pay.D) They dont have much choice of jobs.17.A) Visit the school careers services. C) Look at school bulletin boards.B) Ask their professors for help. D) Go through campus newspapers.18.A) Providing students with information about the library.B) Helping students

16、arrange appointments with librarians.C) Supervising study spaces to ensure a quiet atmosphere.D) Helping students find the books and journals they need.Questions 19 to 21 are based on the passage you have just heard.19.A) It tastes better. C) It is easier to grow.B) It may be sold at a higher price.

17、 D) It can better survive extreme weathers.20.A) It can grow in drier soil. C) It will replace green tea one day.B) It is immune to various diseases. D) It is healthier than green tea.21.A) It does not have a stable market. B) It has made tea farmers life easier. C) It does not bring the promised he

18、alth benefits.D) It has been well received by many tea drinkers.Questions 22 to 25 are based on the passage you have just heard.22. A) They care more about environment.B) They decorate their homes themselves.C) They prefer unique objects of high quality.D) They need decorations to show their status.

19、23. A) They made great contributions to society.B) They could only try to create at night. C) They were proud of their creations.D) They focused on the quality of their products.24. A) Identify fake crafts. C) Design handicrafts themselves.B) Make wise choices. D) Learn the importance of creation.25

20、. A) To attract foreign investments. C) To arouse public interest in crafts.B) To preserve the traditional culture. D) To boost the local economy.PART Reading Comprehension (40 minutes)Section ADirections: In this section, there is a passage with ten blanks. You are required to select oneword for ea

21、ch blank from a list of choices given in a word bank following the passage.Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please mark the corresponding letter for each item on Answer Sheet 2 with a single line through the centre. You

22、 may not use any of the words in the bank more than once.Many men and women have long bought into the idea that there are“male”and“female”brains,believing that explains just about every difference between the sexes.A new study 26 that belief, questioning whether brains really can be distinguished by

23、 gender.In the study, Tel Aviv University researchers 27 for sex differences throughout the entire human brainAnd what did they find? Not much. Rather than offer evidence for 28 brains as “male” or“female”,research shows that brains fall into a wide range , with most people falling right in the midd

24、le.Daphna Joel ,who led the study, said her research found that while there are some genderbased 29 ,many different types of brain cant always be distinguished by gender.While the “average”male and“average”female brains were 30different, you couldnt tell it by looking at individual brain scans. Only

25、 a small 31of people had “all-male”or“all-female”characteristics.Larry Cahill, an American neuroscientist(神经科学家) ,said the study is an important addition to a growing body of research questioning 32 beliefs about gender and brain function. But he cautioned against concluding from this study that all

26、 brains are the same, 33 of gender.“Theres a mountain of evidence 34 the importance of sex influences at all levels of brain function ,”he told The Seattle Times.If anything, he said, the study 35that gender plays a very important role in the brain“even when we are not clear exactly how.”A) abnormal

27、 I) regardlessB) applied J) searchedC) brieflyK) similaritiesD) categorizing L)slightly E)challenges M) suggestsF)figure N)tastesG)percentage O)traditional、 H)provingSection BDirections:In this section, you are gonging to read a passage with ten statements attached to it. Each statement contains inf

28、ormation given in one of the paragraphs. Identify theparagraph from which the information is derived. You may choose a paragraphmore than once.Each paragraph is marked with a letter. Answer the questions by marking the corresponding letter on Answer sheet 2.Can Burglars Jam Your wireless Security Sy

29、stem?A Any product that promises to protect your home deserves careful examination. So it isnt surprising that youll find plenty of strong opinion about the potential vulnerabilities of popular home-security systems.B The most likely type of burglary(入室盗窃) by far is the unsophisticated crime of oppo

30、rtunity, usually involving a broken or some forced entry. According to the FBI, crimes like these accounted for roughly two-thirds of all household burglaries in the US in 2003. The wide majority of the rest were illegal, unforced entries that resulted from something like a window being left open. T

31、he FBI doesnt even track those statistics.C One of the main theoretical home-security concerns is whether or not a given system is vulnerable to being blocked from working altogether. With wired setups, the fear is that a burglar(入室盗窃)might be able to shut your system down simply by cutting the righ

32、t cable. With a wireless setup, you stick battery-powered sensor up around your home that keeps an eye on windows, doors, motion, and more. If they detect something wrong while the system is armed,theyll transmit a wireless alert signal to aa base station that will then raise the alarm. Thatapproach

33、 will eliminate most cord-cutting concerns-but what about their wireless equivalent, jamming? With the right device tuned to the right frequency, whats to stop a thief from jamming your setup and blocking that alert signal from ever reaching the base station?D Jamming concerns are nothing new, and t

34、heyre not unique to security systems. Any deviceThats built to receive a wireless signal at a specific can be overwhelmed by a stronger signal coming in on the same frequency. For comparison, lets say you wanted to “jam” a conversation between two people-all youd need to do is yell in the listeners

35、ear.E Security devices are required to list the frequencies they broadcast on-that means that a potential thief can find what they need to know with minimal Googling. They will, however, need to know what system they are looking for. If you have a sign in your yard declaring what setup you use, that

36、d point them in the right direction, thought at that point, we are talking about a highly targeted, semi-sophisticated attack, and not the sort of forced-entry attack that makes up the majority of burglaries. Its easier to find and acquire jamming equipment for some frequencies than it is for others

37、.F Wireless security providers will often take steps to help combat the threat of jamming attacks. SimpliSafe, winner of our Editors Choice distinction, utilizes a special system thats capable of separating incidental RF interference form targeted jamming attacks. When the system thinks its being ja

38、mmed, itll notify you via push alert (推送警报). From there, its up to you to sound the alarm manually.G SimpliSafe was singled out in one recent article on jamming, complete with a video showing the entire system being effectively bypassed with handheld jamming equipment .After taking appropriate measu

39、re to contain the RF interference to our test lab, we tested the attack out for ourselves, and were able to verify that it is possible with the right equipment. However, we also verified that SimpliSafes anti-jamming system words. It caught us in the act, sent an alert to my smartphone, and also lis

40、ted our RF interference on the systems event log. The team behind the article and video in question make no mention of the system, or whether or not it detected them.H We like the unique nature of that software. It means that a thief likely wouldnt be able to Google how the system words, then figure

41、 out a way around it. Even if they could, SimpliSafe claims that its system is always evolving, and that it varies slightly form system to system, which means there wouldnt be a universal magic formula for cracking it. Other systems also seem confident on the subject of jamming. The team at Frontpoi

42、nt addresses the issue in a blog on its site, citing their own jam protection software and claiming that there arent any documented cases of a successful jam attack since the company began offering wireless security sensors in the 1980s.I Jamming attacks are absolutely possible. As said before, with

43、 the right equipment and the right know-how, its possible to jam any wireless transmission. But how probable is it that someone will successfully jam theirway into your home and steal your stuff?J Lets imagine that you live in a small home with a wireless security setup that offers a functional anti

44、-jamming system. First, a thief is going to need to target your home, specifically.Then, hes going to need to know the technical details of your system and acquire the specific equipment necessary for jamming your specific setup. Presumably, you keep your doors locked at night and while youre away,

45、so the thief will still need to break in. That means defeating the lock somehow, or breaking a window .Hell need to be jamming you at this point, as a broken window or opened door would normally release the alarm .So, too, would the motion detectors in your home, so the thief will need to continue j

46、amming once hes inside and searching for things to steal. However, hell need to do so without tripping the anti-jamming system, the details of which he almost certainly does not have access to.K At the end of the day, these kinds of systems are primarily designed to protect against the sort of oppor

47、tunistic smash-and-grab attack that makes up the majority of burglaries. Theyre also only a single layer in what should ideally be a many-sided approach to securing your home, one that includes common sense things like sound locks and proper exploit lighting at night. No system is impenetrable, and

48、none can promise to eliminate the worst case completely. Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit. A good system is one that keeps that worst-case setting as improbable as possible while also offering strong protection in the event of a less-extraordinary attack.36. It is possible for burglars to make jamming attacks with the necessary equipment and skill.37. Interfering with a wireless security system is similar to interfering with a conversation.38. A burglar has to continuously jam the wireless s

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 企业管理 > 管理学资料

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报