基础英语II期末练习卷(五).docVIP

  1. 1、本文档共8页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  5. 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  6. 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  7. 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  8. 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基础英语II期末练习卷(五).doc

淮安信息职业技术学院2012~2013学年度第二学期 《基础英语Ⅱ》基础英语II期末练习卷(五) 题号 一 二 三 总分 得分 I Listening Comprehension (10%) Section A. Listen to the four dialogs, and choose the best answer to each of the questions you hear. (4%) 1. A. About 30 million pounds. B. About 60 million pounds. C. About 15 million pounds. 2. A. The man doesn’t want to shop on the net. B. The man had a lot of experiences in shopping on the net. C. The man doesn’t want to do business with the woman. 3. A. He is going to deliver a lecture this afternoon. B. He won’t go to the lecture this afternoon. C. He is very interested in the lecture. 4. A. The man should invest in a new PC. B. The man should build a firewall for his PC. C. The man should set a password for his PC. Section B. Listen to the short passage and fill in the blanks with what you hear. (6%) Computer Hacking Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy 5 and have expert-level skills in one particular field and consider computer hacking an “art” form. Some corporations actually employ computer hackers as part of their 6 staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent 7 theft and other serious computer-related crimes. 8 , some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized 8 , or conduct other 10 activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years. Part II Vocabulary and Structure (20%) There are 20 incomplete statements here, each with a blank. You are required to complete each statement by choosing the appropriate answer from the four choices marked A, B, C an

文档评论(0)

xinshengwencai + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

版权声明书
用户编号:5311233133000002

1亿VIP精品文档

相关文档