ࡱ> HJGs R4bjbj2)2)?BPCfPCfbhh8P4m$ZFh#j#j#j#j#j#j#$&})\##4'$   fh# h#  :t,@,^ T#=$0m$R)))X ##`m$)hb : ^N"~'Yf[UxXxvzueQf[ՋՋwS Ջt^^2020t^ 00 ՋyvNxS Ty804-틙Q\ONы(}T) (uNN050201 ef[ ;S`c(WpcOvN(uT{~ NT{ T{(W,gwSbI?z~ NeHe= Part I Writing 100R Summary Writing (1 qQ40R) Write a summary based on the following text. Your summary must be in a continuous paragraph and contain 120 150 words. The term  cyberspace (QEzz) was coined by William Gibson, a science-fiction writer. He first used it in a short story in 1982, and expanded on it a couple of years later in a novel,  Neuromancer , whose main character, Henry Dorsett Case, is a troubled computer hacker and drug addict. In the book Mr Gibson describes cyberspace as  a consensual hallucination experienced daily by billions of legitimate operators. 00His literary creation turned out to be remarkably prescient. Cyberspace has become a popular term, symbolic of the computing devices, networks, wireless links and other infrastructure that bring the internet to billions of people around the world. The myriad connections forged by these technologies have brought tremendous benefits to everyone who uses the web to tap into humanitys collective store of knowledge every day. 00But there is a darker side to this extraordinary invention. Data breaches are becoming ever bigger and more common. Last year over 800m records were lost, mainly through such attacks. Among the most prominent recent victims has been Target, whose chief executive, Gregg Steinhafel, stood down from his job in May, a few months after the giant American retailer revealed that online intruders had stolen millions of digital records about its customers, including credit- and debit-card details. Other well-known firms such as Adobe, a tech company, and eBay, an online marketplace, have also been hit. The potential damage, though, extends well beyond such commercial incursions. Americas president, Barack Obama, said in a White House press release earlier this year that cyber-threats  pose one of the gravest national-security dangers the country is facing. 00Securing cyberspace is hard because the architecture of the internet was designed to promote connectivity, not security. Its founders focused on getting it to work and did not worry much about threats because the network was affiliated with Americas military. As hackers turned up, layers of security, from antivirus programs to firewalls, were added to try to keep them at bay. Gartner, a research firm, reckons that last year organizations around the globe spent $67 billion on information security. 0 But the task is becoming harder. Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly. A recent estimate by the Centre for Strategic and International Studies (CSIS) puts the annual global cost of digital crime and intellectual-property theft at $445 billion a sum roughly equivalent to the GDP of a smallish rich European country such as Austria. 00There is, therefore, an urgent need to provide incentives to improve cyber-security, be they carrots or sticks. One idea is to encourage internet-service providers, or the companies that manage internet connections, to shoulder more responsibility for identifying and helping to clean up computers infected with malicious software. Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit. "$.268BVvz|  L N    $ 6 : < > ؿ~u~uu~j~ajaahuo6CJaJhuo6CJaJo(h$Y6CJaJhIhuo6CJaJhIhuo6CJaJo($h$+5CJOJPJQJ\^JaJ'h$+5CJOJPJQJ\^JaJo(h$+5>*CJOJPJo(h$+CJOJPJo(h$+>*CJOJPJo(h$+5CJOJPJo(h$+CJ OJPJaJ o(#$| N < > ~ kY&&'N)gd$Y dhG$H$gduodgd;;_ d`gd;;_ WD`gduo & FdhG$H$gduodhG$H$$a$> R f h j r t x | ~ "$QIkZ[Y77$$$$%%%&&&''h$+5CJOJPJQJ\^JaJo('huo5CJOJPJQJ\^JaJo(UhCJPJaJh;;_CJPJaJo(h;;_CJPJaJh;;_h;;_CJPJaJ@0 An additional reason for getting tech companies to give a higher priority to security is that cyberspace is about to undergo another massive change. Over the next few years billions of new devices in our daily lives, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the web and make them more useful. Essay Writing (1 60R) There is a debate in the foreign studies circle over the disciplinary attribute of English major in recent years. Do you agree with those scholars who insist that English is merely a tool of communication, or do you agree with those who regard it more as a carrier of cultural values? Write an essay of 400 600 words on your opinion of English as a foreign language. Part II Translation(50R) English-Chinese Translation (25R) The day passed, and the night following, and the next, and next; till, almost without their being aware, five days had slipped by in absolute seclusion, not a sight or sound of a human being disturbing their peacefulness, such as it was. The changes of the weather were their only events, the birds of the forest their only company. By tacit consent they hardly once spoke of any incident of the past subsequent to their wedding-day. The gloomy intervening time seemed to sink into chaos, over which the present and prior times closed as if it never had been. Whenever he suggested that they should leave their shelter, and go forwards towards Southampton or London, she showed a strange unwillingness to move.  Why should we put an end to all that s sweet and lovely! she deprecated.  What must come will come. And, looking through the gap of the curtains:  All is trouble outside there; inside here content. He peeped out also. It was quite true; within was affection, union, error forgiven: outside was the inexorable. 2 Chinese-English Translation (25R) 6R^ReoSNNNNvR R _N9eSNNNNv}TЏ0N)Yv-NV _S;mRvenl0;mRegY7h'` Y7h'`vxdNuzfgavkp pqReSU\vkpp0'YORN0NORe NNʑ>elzflR ib'YQTE\lm9 XR>yO"[ Xۏ'YOyIy0f͑v/f Re@b gN gs^I{:gOTS[sNuN

yO~TAmR [s>yOlQs^ckIN0     "kΏb^N"~'Yf[UxXxvzu ]y`OՋbR,{  PAGE 1 u qQ  NUMPAGES 1 u PAGE  PAGE 1 ''''"'$'D'F'J'T'b'r''''''''' (X(f(n(z(((((((() )))")*):)H)J)L)N)t)v)x)z)~)))))))))))ϵϵhP@h6CJaJh6CJaJo(hP@h6CJaJo(hu hu 6CJaJh$Y6CJaJhu 6CJaJhu hz6CJaJ$h$+5CJOJPJQJ\^JaJ9N)))&*j*l*/1p2r2244 44444G$H$ 2WD`2gdAdhG$H$`gd*YXdhG$H$WD`Xgd*Y dhG$H$gd[ & FdhG$H$gd[dhG$H$dhG$H$^gduogd$Y))$*&*f*h*j*l*n*,,,-////F0H0n0p000000"1&1(1111n2p2r22223zbb.hAhA5CJKHOJPJQJ^JaJo(h[h*YCJPJh*Yh*YCJPJh[CJPJh*YCJPJh[h[CJPJ*h[h[5CJOJPJQJ\^JaJ$h$+5CJOJPJQJ\^JaJ'h$+5CJOJPJQJ\^JaJo(-h$Yhuo5CJOJPJQJ\^JaJo(&333444 4 4444444444 4"4R4V4X4d4f4и{hR@R"h$+5B*KHOJQJaJph+jh$+5B*KHOJQJUaJph%h$+5B*KHOJQJaJo(phh$+5B*OJQJo(phh$+jh$+Uh$+CJmHnHo(sHtH%h$+CJOJPJmHnHo(sHtH.hAh$+5CJKHOJPJQJ^JaJo(.hAhA5CJKHOJPJQJ^JaJo(.hAh$Y5CJKHOJPJQJ^JaJo(444 4"444444444444$a$&`#$f4h4j4t4v44444444444444444444444444нЫн|whh$+CJmHnHo(sHtH h$+o(h$+0JmHnHsHtHh$+ h$+0Jjh$+Uh$+5B*OJQJo(ph"h$+5B*KHOJQJaJph%h$+5B*KHOJQJaJo(ph+jh$+5B*KHOJQJUaJph2h$+5B*KHOJQJaJmHnHphsHtH=0P182P. A!"#$%S Dpx664666668 0@P`p6888 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666PJ_HmH nHsH tHJ`J cke $1$a$ CJKH_HaJmH nHsH tH$A`$ ؞k=W[SONiN nfhCݓvUA 6F͌n|QsAX\ >8O( b\'X77?ڐ!@5?2XY}XFKp GH%Vވ b׫|G_9Ѣ`(B-)( b"{G|07`]PEB_?1r!?S`m-ʥV_\ĵJNS.j4Cw\+ZxC筲/-xkP//z֯A)_BJP5f CFr]]*Q Yv)CeCP@$=9I!_vHB%(fV va ߒ602- "O9IdͿ Z}r'=ySZ%{W<wo~ omͩv{_8}:oq3]ac.`/& 1%@)+-Z ȁcۏ9T" X;adwuƝ^lnmM]\('PbKe#bc{lcwK 6qKzV6B$L\!ޖov{uF]n# ]L-7Bc".$C΄M\KHt)Z,Kf~APܜaߥFrIF.;1dFą84(twk>VϮšQw[Yۙ!®R#nq̎8R{ccާuX>IlcWbFv fNall \ᙠ8B|=V>LI}:^ DVSn<<s< /,ݔyoZ"-XETsbc~h0pd<F7qsGqǭتUtՒfn~i0> LDCY,XW#HGe lܸd|0duޑChϐPڑw>ufІE%=qvQ90`ǙȰR@x pf]6H:EuvVd^(gpL%Ste5@(ً0$$E$} Ns;{/,,+P-jYTk~" q0TPϢ>#̙V=ˀ<ݥvH[$tIhO-xj<4.<= mR+Q.5qͯ!e(C82Q#W.Dxҗ<}/SY.d0u.:i5ܣ$jYhkV\[򡑃A!K3Ɗtz >λZ`%N88zt"Hr8 ^So YsiZvwQ:uDM;YS.}jd{jSnuҮ{Q4iU5U̲0ks\7X\ 5i/Z77'd]u j1bXU͞ڽc3IU2S;緬G8:?g-, gs~unfC(MrT Jxi D=deCn PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Rtheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] *B HSaaad> ')3f44 N)44&-/5@BHOSZ\d!!!@ @H 0(  0(  B S  ?/67:>CJPSu59IK{  hl3s }]l   ')*Mz]]__+!3y~(n^`o(  H\^H`\hH) \^`\hH. \^`\hH. 4\^4`\hH)  \^ `\hH. | \^| `\hH.  \^ `\hH) \^`\hH.^`o(  H\^H`\hH) \^`\hH. \^`\hH. 4\^4`\hH)  \^ `\hH. | \^| `\hH.  \^ `\hH) \^`\hH.y+!3                 & 84ojHgl> z Aj H A ln ~ VOLKiG$8/WNI$8"jl"=a&W''o'($+x152F2c2[F3Mk4+?5v6w6 747]+9j<z> >d?@}CgEBH9J5iJYK~LM>PTQPPQP{T.UYZ\[^\ _;;_UF_gT_z`6<`kaSb1Bd#jNgjjl`nQnuo[tvW*vvox>Rz&{}{|pT|[|e}Tkm.,*,#:FXQe,!fF u 6x<JL W <.`\2';@F%O*csf8z90$YFTklznc#A6Lun1~o *DUR?9XGCULZZ;P*Y\\,/:"&h<RWRr[+smdBk2Wdm;X t2jE>It+)#T$^t.chbs@kkkk PP P P@PP$@PP,@PPP8@P$Unknown G*Ax Times New Roman5Symbol3. *Cx Arial;= |8ўSOSimHeiA4  N[_GB2312N[-= |8N[?|8I{~DengXian;([SOSimSun9,|8I{~ LightA$BCambria Math AQhN]Ǝm{gzF$6R '6R 'aZ&!),.:;?]}    & 6"0000 0 0 00000 =@\]^([{  0 0 00000;[2}}KQP  ?`n2! xxoATT ^NFUf[bUxXxvzueQf[ՋՋwS_o(u7bChris  Oh+'0 $0 P \ h t$㶫ѧԺ˶ʿоѧԾ ΢ûNormalChris4Microsoft Office Word@ػ(@ts-@/F5@2,6R՜.+,D՜.+,@   (08 ΢й' } d ?GKSOProductBuildVer2052-11.1.0.9145  !#$%&'()*+,-./012345689:;<=>@ABCDEFIRoot Entry F@,K1Table")WordDocument?BSummaryInformation(7DocumentSummaryInformation8?CompObjn  FMicrosoft Word 97-2003 ĵ MSWordDocWord.Document.89q