第1题
听力原文:This new network system is much easier to use, don't you think?
(A) I think it's a new system.
(B) Yes, it's quite an improvement.
(C) It's a brand-new computer.
(40)
A.
B.
C.
第2题
Visa has spent hundreds of millions of dollars every year __________.
A.to maintain the airtight security system
B.to recruit engineers to keep the network up
C.to introduce new security equipments
D.to develop the most advanced risk-management technology
第3题
?Read the article below about computers.
?Choose the best work to fill each gap, from A, B, C or D.
?For each question 19-33, mark one letter (A, B, C or D) on your Answer Sheet.
Making computers work for you
It is a typical day at the office--a senior manager is away when an urgent letter arrives from one of her clients. Meanwhile someone has discovered that the wrong price list has been sent out and half of the last (19) has been returned because the addresses are out of date. after a lot of time and effort has been (20) sorting out all these problems, someone asks (21) the new computer system didn't (22) all of this from happening. Unfortunately, such problems are (23) .
One firm which used to have serious computer problems is Brinkman Lewis, a professionals ervices firm. David Callaghan, a partner at the firm, (24) . 'The initial problem for us was that we had all this information on computers around the office but didn't know what to (25) with it.
Finally, Brinkman Lewis decided to (26) a network linking all the machines in the office. (27) than simply asking one of the senior managers to (28) responsibility for information technology, the firm brought in (29) Zoe Edlington to plan the development of its network. She began by upgrading the (30) telephone system so it could be integrated with the computers to provide closer links between the (31) of the firm. She then began finding other ways in which the information already on the network could be (32) more effectively.
The strategy worked. The company soon realized that there could be a market for such a (33) , and before long Zoe Edlington was head of the firm's new network consultancy business.
(19)
A.campaign
B.postage
C.mail shot
D.launch
第4题
Many on-line crimes are not so different to【C6】______seen in real world, the spreading of fake data, cheating and blackmail,【C7】______property rights infringements and privacy violations. But computer hackers also create new forms of crime【C8】______the Internet changes the world into a "global village".
With the【C9】______of e-business, on-line crimes could not only cause great damage to【C10】______, but could also threaten the【C11】______of national political, economic and cultural orders. The【C12】______legal system in most countries【C13】______weak when dealing with on-line crimes,【C14】______to the sophisticated technology involved. For this reason, many countries are considering【C15】______Internet laws to curb on-line crimes.
In China,【C16】______there are millions of Internet surfers, it is more important to formulate new laws and rules on network security than to【C17】______the existing ones. When drafting and【C18】______new laws, China should also【C19】______the relations between protecting network security【C20】______the sound development of Internet.
【C1】
A.surfing
B.operating
C.reaching
D.exploring
第5题
The most commonly cited reason for this state of affairs is that the countrys agrarian-age education system, separated from the needs of the business world, fails to prepare students in the primary and secondary grades for twenty-first-century work. Yet an inadequate and outmoded education system is only part of the problem. A less tangible but equally powerful cause is an antique classification system that divides the workforce into two camps: white-collar knowledge workers and blue-collar manual labourers.
Blue-collar workers emerged in the United States during the Industrial Age as work migrated from farms to factories. White-collar office workers became a significant class in the twentieth century, outnumbering their blue-collar brethren by mid-century. But the white or blue paradigm has clearly outlived its utility. Corporations increasingly require a new layer of knowledge worker: a highly skilled multi-disciplinarian who combines the mind of the white-collar worker with the hands of the blue-collar employee. Armed with a solid grounding in mathematics and science(physics, chemistry, and biology), these "gold-collar" workers — so named for their contributions to their companies and to the economy, as well as for their personal earning ability — apply that knowledge to technology. Of course, the gold-collar worker already exists in a wide range of jobs across a wide range of businesses: think of the maintenance technician who tests and repairs aircraft systems at American Airlines; the network administrator who manages systems and network operations at P&G; the advanced-manufacturing technician at Intel.
But until American business recognises these people as a new class of worker, one whose collar is neither blue nor white, demands that schools do a better job of preparing employees for the twenty-first-century workforce will be futile.
What effects may the insufficiency of qualified workers have, according to the passage?
A.It decreases the costs of high technology companies.
B.It emphasises the importance of unfilled jobs.
C.It hinders the development of the US economy.
D.It accelerates the collapse of the old education system.
第6题
The Silo Paulo city health service has launched a 42mn-real (US $14.6mn) 【C1】______ system to integrate the city's 756 health sector 【C2】______ , including 65 hospitals and 356 clinics, health 【C3】______ coordinator Antonio Carlos Leda told BNamericas.
"We think the 【C4】______ is small, given the size of the city, and will quickly provide 【C5】______ . That doesn't even take into account the improvement in 【C6】______ of quality of service," Leda said.
The investment includes approximately 12mn reais in software and network 【C7】______ , along with 30mn reais in computers. The software, based on open source 【C8】______ , can be 【C9】______ to other municipalities.
"We used open source because it is an important way to return resources to the country. The software can be used by other government 【C10】______ but we ask that they share any improvements they make to the system," Leda said.
The 【C11】______ contracted Brazilian integrator Atech technologies to develop and integrate a system based on 【C12】______ different systems previously used by the health ministry.
The new system provides 【C13】______ patient identification and integrates patient records among all of the city's health 【C14】______ , thereby improving efficiency and increasing the level of service provided.
Patients also have internet 【C15】______ to the system so they can confirm information, make requests and register complaints.
The government spent about a year developing the project, according to Leda.
【C1】______
A.automated
B.automatic
C.computerized
D.programmed
第7题
Hack
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word “hacker” didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’s hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter bow much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable e-mail attachments, bow are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.
Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
A.They are all good examples of today’s computer users.
B.They are driven by greed, power, revenge, or some other malicious intent.
C.Their goal is to push programs beyond what they are designed to do.
D.They are all dead.
第8题
The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.
Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
A.They are all good examples of today's computer users.
B.They are driven by greed, power, revenge, or some other malicious intent.
C.Their goal is to push programs beyond what they are designed to do.
D.They are all dead.
第9题
One of the three major commercial networks, CBS were 【M1】______
organized in 1928 when its founder William Paley acquired
ownership of a group of radio station. 【M2】______
As the Columbia Broadcasting System expanded its
operations, soon become the largest radio network in the United 【M3】______
States, it precociously recognized the potential for the rapidly
evolved television broadcasting technology. On July 13th, 1931, 【M4】______
it began experimentally television broadcasting in New York, 【M5】______
and ten years later began regular black and white week 【M6】______
broadcasts over its WCBW TV station in the same city, that 【M7】______
became WCBS TV in November 1946. With Television City in
Hollywood, CBS launched the industry's first full scale
production studio.
Today CBS owns television stations, radio stations, and
home video productions and distribution interests. The CBS
Broadcasting Group composed of six divisions: television 【M8】______
network, entertainment, sports, news, local television stations,
and radio.
For most of commercial television history, CBS has been
the leader in prime time ratings, having the highest rated
shows in almost every year from the mid-1950s through the
mid-1914s. During the late 1914s, however, CBS lost its top
position from NBC. 【M9】______
CBS has traditionally been strong in the TV news area. The
network began the first regular TV news program in 1948 with
Douglas Edwards as anchor. Journalism legends such as Edward
R. Murrow and Walter Cronkite gave CBS its reputation as
quality news broadcaster. 【M10】______
【M1】
第10题
?Read the text below about television network.
?In most of the lines 41—52 there is tone extra word. It is either grammatically incorrect or does not fit in with the meaning of the text. Some lines, however, are correct.
?If a line is correct, write CORRECT on your Answer Sheet.
?If there is an extra word in the line, write the extra word in CAPITAL LETTERS on your Answer Sheet.
Television Network
0 As one of the three major commercial networks, CBS was organized
00 in 1928 in which its founder, William Paley, acquired ownership of a
41 the group of radio stations. As the Columbia Broadcasting System
42 expanded its operations, and soon becoming the largest radio network
43 In the United States, it is precociously recognized the potential for the
44 rapidly evolving television broadcasting technology. On July 13th,
45 1931, it began to experimental television broadcasting in New York,
46 and ten years later it began regular black and white week broadcasts
47 over its WCBW TV station in the same city, in which became WCBS TV
48 In November 1946. With Television City in Hollywood, CBS has launched
49 the industry’s first full scale production studio there. Today CBS owns
50 television stations, radio stations, and home video production and distribution is
51 interests. The CBS Broadcasting Group is composed of six divisions: television
52 network, entertainment, sports, news, local television stations, and the radio. For most of commercial television history, CBS has been the leader in prime time ratings, having the highest rated shows in almost every year from the mid- 1950s through the mid-1980s.
(41)