月大学英语四级考试真题(第三套).doc

上传人:wj 文档编号:2004052 上传时间:2023-05-02 格式:DOC 页数:11 大小:87KB
下载 相关 举报
月大学英语四级考试真题(第三套).doc_第1页
第1页 / 共11页
月大学英语四级考试真题(第三套).doc_第2页
第2页 / 共11页
月大学英语四级考试真题(第三套).doc_第3页
第3页 / 共11页
月大学英语四级考试真题(第三套).doc_第4页
第4页 / 共11页
月大学英语四级考试真题(第三套).doc_第5页
第5页 / 共11页
月大学英语四级考试真题(第三套).doc_第6页
第6页 / 共11页
月大学英语四级考试真题(第三套).doc_第7页
第7页 / 共11页
月大学英语四级考试真题(第三套).doc_第8页
第8页 / 共11页
月大学英语四级考试真题(第三套).doc_第9页
第9页 / 共11页
月大学英语四级考试真题(第三套).doc_第10页
第10页 / 共11页
月大学英语四级考试真题(第三套).doc_第11页
第11页 / 共11页
亲,该文档总共11页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

月大学英语四级考试真题(第三套).doc

《月大学英语四级考试真题(第三套).doc》由会员分享,可在线阅读,更多相关《月大学英语四级考试真题(第三套).doc(11页珍藏版)》请在冰点文库上搜索。

月大学英语四级考试真题(第三套).doc

2016年12月大学英语四级考试真题(第3套)

PartI

Writing

(30minutes)

Directions:

Forthispart,youareallowed30minutestowriteanessay.Supposeyouhavetwooptionsupongraduation:

oneistoworkinastate-ownedbusinessandtheotherinajointventure.Youaretomakeachoicebetweenthetwo.Writeanessaytoexplainthereasonsforyourchoice.Youshouldwriteatleast120wordsbutnomorethan180words.

PartII

ListeningComprehension

(25minutes)

说明:

由于2016年12月四级考试全国共考了2套听力,本套真题听力与前2套内容完全一样,只是顺序不一样,因此在本套真题中不再重复出现。

PartⅢ

ReadingComprehension

(40minutes)

SectionA

Directions:

Inthissection,thereisapassagewithtenblanks.Youarerequiredtoselectonewordforeachblankfromalistofchoicesgiveninawordbankfollowingthepassage.Readthepassagethroughcarefullybeforemakingyourchoices.Eachchoiceinthebankisidentifiedbyaletter.PleasemarkthecorrespondingletterforeachitemonAnswerSheet2withasinglelinethroughthecentre.Youmaynotuseanyofthewordsinthebankmorethanonce.

Questions26to35arebasedonthefollowingpassage.

Manymenandwomenhavelongboughtintotheideathatthereare"male"and"female"brains,believingthatexplainsjustabouteverydifferencebetweenthesexes.Anewstudy26thatbelief,questioningwhetherbrainsreallycanbedistinguishedbygender.

Inthestudy,TelAvivUniversityresearchers27forsexdifferencesthroughouttheentirehumanbrain.

Andwhatdidtheyfind?

Notmuch.Ratherthanofferevidencefor28brainsas"male"or"female,"researchshowsthatbrainsfallintoawiderange,withmostpeoplefallingrightinthemiddle.

DaphnaJoel,wholedthestudy,saidherresearchfoundthatwhiletherearesomegender-based29,manydifferenttypesofbraincan'talwaysbedistinguishedbygender.

Whilethe"average"maleand"average"femalebrainswere30different,youcouldn'ttellitbylookingatindividualbrainscans.Onlyasmall31ofpeoplehad"all-male"or"all-female"characteristics.

LarryCahill,anAmericanneuroscientist(神经科学家),saidthestudyisanimportantadditiontoagrowingbodyofresearchquestioning32beliefsaboutgenderandbrainfunction.Buthecautionedagainstconcludingfromthisstudythatallbrainsarethesame,33ofgender.

"There'samountainofevidence34theimportanceofsexinfluencesatalllevelsofbrainfunction,"hetoldTheSeattleTimes.

Ifanything,hesaid,thestudy35thatgenderplaysaveryimportantroleinthebrain--"evenwhenwearenotclearexactlyhow."

A.abnormal

B.applied

C.briefly

D.categorizing

E.challenges

F.figure

G.percentage

H.proving

I.regardless

J.searched

K.similarities

L.slightly

M.suggests

N.tastes

0.traditional

SectionB

Directions:

Inthissection,youaregoingtoreadapassagewithtenstatementsattachedtoit.Eachstatementcontainsinformationgiveninoneoftheparagraphs.Identifytheparagraphfromwhichtheinformationisderived.Youmaychooseaparagraphmorethanonce.Eachparagraphismarkedwithaletter.AnswerthequestionsbymarkingthecorrespondingletteronAnswerSheet2.

CanBurglarsJamYourWirelessSecuritySystem?

A.Anyproductthatpromisestoprotectyourhomedeservescarefulexamination.Soitisn’tsurprisingthatyou’11findplentyofstrongopinionsaboutthepotentialvulnerabilitiesofpopularhome—securitysystems.B.Themostlikelytypeofburglary(人室盗窃)byfaristheunsophisticatedcrimeofopportunity,usuallyinvolvingabrokenwindoworsomeforcedentry.AccordingtotheFB1.crimesliketheseaccountedforroughlytwo.thirdsofallhouseholdburglariesintheUSin2013.Thewidemajorityoftherestwereillegal.unforcedentriesthatresultedfromsomethinglikeawindowbeingleftopen.TheoddsofacriminalusingtechnicalmeanstobypassasecuritysystemaresosmallthattheFBIdoesn’teventrackthosestatistics.

C.Oneofthemaintheoreticalhome—securityconcernsiswhetherornotagivensystemisvulnerabletobeingblockedfromworkingaltogether.Withwiredsetups,thefearisthataburglar(人室盗贼)mightbeabletoshutyoursystemdownsimplybycuttingtherightcable.Withawirelesssetup.youstickbattery—poweredsensorsuparoundyourhomethatkeepaneyeonwindows。

doors,motion,andmore.Iftheydetectsomethingwrongwhilethesystemisarmed.they’lltransmitawirelessaleftsignaltoabasestationthatwillthenraisethealarm.Thatapproachwilleliminatemostcord—cuttingconcerns--butwhatabouttheirwirelessequivalent,jamming?

withthefightdevicetunedtothefightfrequency,what’stostopathieffromjammingyoursetupandblockingthatalertsignalfromeverreachingthebasestation?

D.Jammingconcernsarenothingnew,andthey’renotuniquetosecuritysystems.Anydevicethat’sbuilttoreceiveawirelesssignalataspecificfrequencycanbeoverwhelmedbyastrongersignalcominginonthesamefrequency.Forcomparison.1et’ssayyouwantedto“jam”aconversationbetweentwopeople--allyou’dneedtodoisyellinthelistener’sear.

E)Securitydevicesarerequiredtolistthefrequenciestheybroadcaston—matmeansthatapotentialthiefcanfindwhattheyneedtoknowwithminimalGoogling.Theywill.however.needtoknowwhatsystemthey’relookingfor.Ifyouhaveasigninyouryarddeclaringwhatsetupyouuse,that’dpointthemintherightdirection,thoughatthatpoint,we’retalkingaboutahighlytargeted,semi—sophisticatedattack,andnotthesortofforced—entryattackthatmakesupthemajorityofburglaries.It’seasiertofindandacquirejammingequipmentforsomefrequenciesthanitisforothers.

F)Wirelesssecurityproviderswilloftentakestepstohelpcombatthethreatofjammingattacks.SimpliSafe,winnerofourEditors’Choicedistinction.utilizesaspecialsystemthat’scapableofseparatingincidentalRFinterferencefromtargetedjammingattacks.Whenthesystemthinksit’sbeingjammed,it’llnotifyyouviapushalert(推送警报).Fromthere,it’suptoyoutosoundthealarmmanually.

G)SimpliSafewassingledoutinonerecentarticleonjamming,completewithavideoshowingtheentiresystembeingeffectivelybypassedwithhandheldjammingequipment.AftertakingappropriatemeasurestocontaintheRFinterferencetoourtestlab,wetestedtheattackoutforourselves,andwereabletoverifythatit’spossiblewiththerightequipment.However.wealsoverifiedthatSimpliSafe’santi-jammingsystemworks.Itcaughtusintheact,sentanalerttomysmartphone,andalsolistedourRFinterferenceonthesystem’seventlog.Theteambehindthearticleandvideoinquestionmakenomentionofthesystem,orwhetherornotitdetectedthem.

H)Weliketheuniquenatureofthatsoftware.Itmeansthatathieflikelywouldn’tbeabletoGooglehowthesystemworks.thenfigureoutawayaroundit.Eveniftheycould,SimpliSafeclaimsthatitssystemisalwaysevolving,andthatitvariesslightlyfromsystemtosystem,whichmeanstherewouldn’tbeauniversalmagicformulaforcrackingit.Othersystemsalsoseemconfidentonthesubjectofjamming.TheteamatFrontpointaddressestheissueinablogonitssite,citingtheirownjamprotectionsoftwareandclaimingthattherearen’tanydocumentedcasesofasuccessfuljamattacksincethecompanybeganofferingwirelesssecuritysensorsinthel980s.

I)Jammingattacksareabsolutelypossible.Assaidbefore.withthefightequipmentandtherightknow—how,it’spossibletojamanywirelesstransmission.Buthowprobableisitthatsomeonewillsuccessfullyjamtheirwayintoyourhomeandstealyourstuff?

J)Let’simaginethatyouliveinasmallhomewithawirelesssecuritysetupthatoffersafunctionalanti—jammingsystem.First,athiefisgoingtoneedtotargetyourhome,specifically.Then,he’sgoingtoneedtoknowthetechnicaldetailsofyoursystemandacquirethespecificequipmentnecessaryforjammingyourspecificsetup.Presumably,youkeepyourdoorslockedatnightandwhileyou’reaway,sothethiefwillstillneedtobreakin.Thatmeansdefeatingthelocksomehow,orbreakingawindow.He’11needtobejammingyouatthispoint,asabrokenwindoworopeneddoorwouldnormallyreleasethealarm.S0,too,wouldthemotiondetectorsinyourhome,sothethiefwillneedtocontinuejammingoncehe’sinsideandsearchingforthingstosteal.However.he’11needtodosowithouttrippingtheanti-jammingsystem,thedetailsofwhichhealmostcertainlydoesnothaveaccessto.

K)Attheendoftheday,thesekindsofsystemsareprimarilydesignedtoprotectagainstthesortofopportunisticsmash—and—grabattackthatmakesupthemajorityofburglaries.They’realsoonlyasinglelayerinwhatshouldideallybeamany—sidedapproachtosecuringyourhome,onethatincludescommonsensethingslikesoundlocksandproperexteriorlightingatnight.Nosystemisimpenetrable,andnonecanpromisetoeliminatetheworstcasecompletely.Everyoneofthemhasvulnerabilitiesthataknowledgeablethiefcouldtheoreticallyexploit.Agoodsystemisonethatkeepsthatworst—casesettingasimprobableaspossiblewhilealsoofferingstrongprotectionintheeventofaless-extraordinaryattack.

36.Itispossibleforburglarstomakejammingattackswiththenecessaryequipmentandskill.37.Interferingwithawirelesssecuritysystemissimilartointerferingwithaconversation.

38.Aburglarhastocontinuouslyjamthewirelesssecuritydevicetoavoidtriggeringthealarm,bothinsideandoutsidethehouse.

39.SimpliSafeprovidesdevicesthatareabletodistinguishincidentalradiointerferencefromtargetedjammingattacks.

40.Onlyaverysmallproportionofburglariesarecommittedbytechnicalmeans.

41.ItisdifficulttocrackSimpliSafeasitssystemkeepschanging.

42.Wirelessdeviceswilltransmitsignalssoastoactivatethealarmoncesomethingwrongisdetected.

43.Differentmeasuresshouldbetakentoprotectone’shomefromburglaryinadditiontothe

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 高中教育 > 高中教育

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2