Directions: For this part, you are allowed 30 minutes to write a composi-tion on the topic Aid Education in China.You should write at least 120 words f-ollowing the outline given below in Chinese:
Aid Education in China
Each year, college students, encouraged to aid students in the poverty-stricken areas, volunteer themselves in poor villages for a year and try to improve education in poor areas.
Aid-education has been beneficial in two aspects. On the one hand, college volunteers are really devoted to the cause. They have opened the eyes of students in underdeveloped regions to the outside world by bringing them new knowledge and thoughts. As a result, they are extremely well-received by the children there. On the other hand, college students have received a rigorous training by adapting to the harsh living conditions. They are enjoying the appreciation and no-distance friendship from the children. What’s more, they are greatly inspired by the moving and tireless spirit of the children.
In my opinion, China’s educational development can’t be isolated from each individual and we college students should take the lead in response to the appeal for offering aid to children in poor areas.
Directions:For this part, you are allowed 30 minutes to write a composition on the topic : Information Security. You should write at least 120 words following the outline given below in Chinese.
The human beings are stepping into the information society. The information industry develops very rapidly, so do the hackers, trick-playing teens, exploring children, fraudsters, and serious white-collar criminals. Thus, information security becomes an impending important issue.
In case of information breach, the victims-----government department, an organization or an institution, or a company will inevitably suffer great or small loss. Government may be threatened with national security. Companies may lose opportunities to develop new projects. And the public’s and users’ confidence will be damaged.
Then how to deal with this issue? Technology is only a partial solution to information security. What’s more important is that organizations and companies should promote the awareness on information security to its staff. However, since no system can ever be 100 percent secure, a prevention-only approach to information security management is not enough. Companies and organizations should adopt a dual approach to information security management by combing prevention and detection techniques.