快捷报班:   
快捷登陆: QQ登录 微博登录 你好,欢迎来到新东方
账号 密码 登录 注册 忘记密码

新东方网>上海新东方学校>上海雅思>雅思阅读>正文

雅思阅读实战模拟试题(三)

2018-06-01 13:31

来源:

作者:

  Part III

  Keys to the Questions 1-14

  1.TRUE

  Explanation

  See the first sentence in Section A “Aftera period of introversion and stunned self-disbelief, continental European governments will recover their enthusiasm for pan-European institution-building in 2007”.

  2.FALSE

  Explanation

  See the third sentence in Section C “And in 2005 they were supposed to ratify a European constitution, laying the ground for yet more integration—until the calm rhythm was rudely shattered by French and Dutch voters.”.

  3.TRUE

  Explanation

  See the first sentence in the Section D “In 2007 the European Union marks the 50th anniversary of another treaty—the Treaty of Rome, its founding charter.”.

  4.FALSE

  Explanation

  See the third sentence in Section D“But it does not take a Machiavelli to spot that once governments have signed the declaration (and it seems unlikely anyone would be so uncollegiate as to veto it) they will already be halfway towards committing themselves to a new treaty”.

  5.NOT GIVEN

  Explanation

  See the first sentence in Section E “According to the German government—which holds the EU's agenda-setting presidency during the first half of 2007”.

  6.TRUE

  Explanation

  See the third sentence in Section H“The British government, for one, will almost certainly not want to go with the flow, beginning yet another chapter in the long history of confrontation between Britain and the rest of Europe”.

  7.further integration

  Explanation

  See the second sentence in Section C“Every four or five years, European countries take a large stride towards further integration by signing a new treaty”.

  8.lay the ground

  Explanation

  See the third sentence in Section C “And in 2005 they were supposed to ratify a European constitution, laying the ground for yet more integration—until the calm rhythm was rudely shattered by French and Dutch voters.”.

  9.publc rejection

  Explanation

  See the third sentence in Section E“Then, according to bureaucratic planners in Brussels and Berlin, blithely ignoring the possibility of public rejection, the whole thing will be signed, sealed and a new constitution delivered in 2009--10.”

  10.bureaucratc momentum

  Explanation

  See the frst sentence in Section H “The upshot is that the politics of the three large continental countries, bureaucratic momentum and the economics of recovery will all be aligned to give a push towards integration in 2007.”.

  11.C

  Explanation

  See the last sentence in Section B “Since politics often reacts to economic change with a lag, 2006's improvement in economic growth will have its impact in 2007, though the recovery may be ebbing by then”.

  12.A

  Explanation

  See the last sentence in Section C “But the political impetus to sign something every four or five years has only been interrupted, not immobilised, by this setback.”

  13.D

  Explanation

  See the first sentence in Section D “In 2007 the European Union marks the 50th anniversary of another treaty—the Treaty of Rome, its founding charter.”

  14.B

  Explanation

  See third sentence in Section C: “And in 2005 they were supposed to ratify a European constitution, laying the ground for yet more integration—until the calm rhythm was rudely shattered by French and Dutch voters.”

★Hackers target the home front

  Thursday February 15, 2007

  The Guardian

  1.One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives.For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2.The hackers are homing in on the trend for people to work from home.The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3.For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.

  4.And the hackers are employing increasingly sophisticated techniques.Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5.The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user.This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6.Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7.Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8.Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud.Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank."

  9.It is not just banks that have been targets.Last year attempts were made to steal information from the Houses of Parliament using malicious email.Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10.According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing.Two years ago they were being seen once every two months, but now they are seeing one or two a day.This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11."The hackers are now aiming to take over computers, particularly those of home users.Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors."

  Increased vigilance

  12.Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector.What is happening is that crime is doing what it always does, which is look for the weakest link.Home working is where they perceive a weakness.

  13."This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home.For home working to be effective, security needs to be as effective as if working in an office."

  (667 words)

新东方留学院校库,留学选校有门道

A BETTER YOU,A BIGGER WORLD!

焦点推荐

版权及免责声明

凡本网注明"稿件来源:新东方"的所有文字、图片和音视频稿件,版权均属新东方教育科技集团(含本网和新东方网) 所有,任何媒体、网站或个人未经本网协议授权不得转载、链接、转贴或以其他任何方式复制、发表。已经本网协议授权的媒体、网站,在下载使用时必须注明"稿件来源:新东方",违者本网将依法追究法律责任。

本网未注明"稿件来源:新东方"的文/图等稿件均为转载稿,本网转载仅基于传递更多信息之目的,并不意味着赞同转载稿的观点或证实其内容的真实性。如其他媒体、网站或个人从本网下载使用,必须保留本网注明的"稿件来源",并自负版权等法律责任。如擅自篡改为"稿件来源:新东方",本网将依法追究法律责任。

如本网转载稿涉及版权等问题,请作者见稿后在两周内速来电与新东方网联系,电话:010-60908555。

×