- 1、本文档共8页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基础英语II期末练习卷(五).doc
淮安信息职业技术学院2012~2013学年度第二学期
《基础英语Ⅱ》基础英语II期末练习卷(五)
题号 一 二 三 总分 得分 I Listening Comprehension (10%)
Section A. Listen to the four dialogs, and choose the best answer to each of the questions you hear. (4%)
1. A. About 30 million pounds.
B. About 60 million pounds.
C. About 15 million pounds.
2. A. The man doesn’t want to shop on the net.
B. The man had a lot of experiences in shopping on the net.
C. The man doesn’t want to do business with the woman.
3. A. He is going to deliver a lecture this afternoon.
B. He won’t go to the lecture this afternoon.
C. He is very interested in the lecture.
4. A. The man should invest in a new PC.
B. The man should build a firewall for his PC.
C. The man should set a password for his PC.
Section B. Listen to the short passage and fill in the blanks with what you hear. (6%)
Computer Hacking
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy 5 and have expert-level skills in one particular field and consider computer hacking an “art” form. Some corporations actually employ computer hackers as part of their 6 staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent 7 theft and other serious computer-related crimes. 8 , some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized 8 , or conduct other 10 activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.
Part II Vocabulary and Structure (20%)
There are 20 incomplete statements here, each with a blank. You are required to complete each statement by choosing the appropriate answer from the four choices marked A, B, C an
您可能关注的文档
最近下载
- 中华人民共和国进口压力容器安全性能监督检验证书及报告书.doc
- TCQFX001-2024四川省机动车维修工时定额标准.pptx VIP
- 《中华人民共和国港口法》培训与解读课件.pptx VIP
- 人人商城恶意诉讼应诉指南-含胜诉答辩状和证据清单.docx VIP
- 《GB/T 9286-2021色漆和清漆 划格试验》.pdf
- 人教版2025高中地理必修二2.2城镇化 课件.pptx VIP
- 厨房设备质量保证措施.docx VIP
- 高一化学_第一章.ppt VIP
- 八年级上册第三单元整体教学设计.pdf VIP
- 江苏省扬州市宝应县2023-2024学年八年级下学期6月期末考试物理试卷(含答案).docx VIP
文档评论(0)