ImageVerifierCode 换一换
格式:PDF , 页数:11 ,大小:72.20KB ,
资源ID:1267291      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1267291.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(2015年电子科技大学211翻译硕士英语考研真题.pdf)为本站会员(花仙子)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

2015年电子科技大学211翻译硕士英语考研真题.pdf

1、共11页 第1页 电子科技大学 2015年攻读硕士学位研究生入学考试试题 考试科目: 211 翻译硕士英语 注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。 Part I Grammar at the age of three he performed his first experiment. A) intricate B) indignant C) incidental D) inquisitive 10. The current political _ of our country is favourable for foreign investments. A) cl

2、imate B) temperature C) weather D) state 11. The purpose of the survey was to _ the inspectors with local conditions. A) inform B) notify C) instruct D) acquaint 12. The motorist had to _ to avoid knocking the old woman down in the middle of the road.A) swerve B) twist C) depart D) swing 13. Xiao Ya

3、n was somewhat short-sighted; she had the habit of _ at people. A) glancing B) peering C) gazing D) scanning 14. Even though the evidence is so overwhelming, if one juror is still _, the case must be retried. A) present B) surprised C) skeptical D) hungry 15. The contents of the box must _ to the de

4、scription on the label. A) yield B) appeal C) correspond D) relate 16. I have no objection _ your story again. A) to hear B) to hearing C) to having heard D) to have heard 共11页 第3页 17. You will see this product _ wherever you go. A) to be advertised B) advertised C) advertise D) advertising 18. Such

5、 crimes may be so complex that months or years go by before anyone _ them. A) discovered B) will discover C) would have discovered D) discovers 19. While crossing the mountain area, all the men carried guns lest they _ by wild animals. A) should be attacked B) had been attacked C) must be attacked D

6、) would be attacked 20. It was not until it was getting dark _ the child remembered to go back home. A) when B) had C) that D) then 21. The newly developing science of artificial intelligence aims at programming the computer to think, reason and react _ people do. A) by the same way as B) in much th

7、e same way that C) with the same way as D) as much as the same way that 22. The residents _ had been damaged by the fire were given help by the Red Cross. A) all of their homes B) all their homes C) whose all homes D) all of whose homes 23. Contrast may make something appear more beautiful than it i

8、s when _ alone. A) seen B) is seen C) to be seen D) having been seen 24. Sometimes children have trouble _ fact from fiction and may believe that such things actually exist. A) to separate B) separating C) for separating D) of separating 25. Things might have been much worse if the mother _ on her r

9、ight to keep the baby. A) has been insisting B) had insisted C) would insist D) insisted 26. Many a delegate was in favor of his proposal that a special committee _ to investigate the incident. A) were set up B) was set up C) be set up D) set up 共11页 第4页 27. _ the increase in air fares, most people

10、still prefer to travel by plane. A) No matter how B) Regardless C) Though D) Despite 28. I don t think it is funny, but my friend _. A) cannot help to laugh B) cannot help laugh C) cannot but laughing D) cannot help but laugh 29. _, Chinas large and medium-sized state enterprises need to improve the

11、ir management right now. A) As it should be B) As it must be C) As it is D) As it were 30. The budget they made is unrealistic _ it disregards increased costs. A) for that B) for which C) in that D) in which Part II Reading Comprehension (1.5x20 + 1x10 = 40 Points) In this section there are five rea

12、ding passages followed by a total of 20 multiple-choice questions and 5 short answer questions. Please read the passages and then write your answers on the ANSWER SHEET. TEXT A Design of all the new tools and implements is based on careful experiments with electronic instruments. First, a human “gui

13、nea pig” is tested using a regular tool. Measurements are taken of the amount of work done, and the buildup of heat in the body. Twisted joints and stretched muscles can not perform as well, it has been found, as joints and muscles in their normal positions. The same person is then tested again, usi

14、ng a tool designed according to the suggestions made by Dr. Tichauer. All these tests have shown the great improvement of the new designs over the old. One of the electronic instruments used by Dr. Tichauer, the myograph, makes visible through electrical signals the work done by human muscle. Anothe

15、r machine measures any dangerous features of tools, thus proving information upon which to base a new design. One conclusion of tests made with this machine is that a tripod stepladder is more stable and safer to use than one with four legs. This work has attracted the attention of efficiency expert

16、s and time-and-motion-study engineers, but its value goes far beyond that. Dr. Tichauers first thought is for the health of the tool user. With the repeated use of the same tool all day long on production lines and in other jobs, even light manual work can put a heavy stress on one small area of the

17、 body. In time, such stress can 共11页 第5页 cause a disabling disease. Furthermore, muscle fatigue is a serious safety hazard. Efficiency is the by-product of comfort, Dr. Tichauer believes, and his new designs for traditional tools have proved his point. 31. What are involved in the design of a new to

18、ol according to the passage? A) Electronic instruments and a regular tool. B) A human “guinea pig” and a regular tool. C) Electronic instruments and a human “guinea pig”. D) Electronic instruments, a human “guinea pig” and a regular tool. 32. From the passage we know that joints and muscles perform

19、best when _. A) they are twisted and stretched B) they are in their normal positions C) they are tested with a human “guinea pig” D) they are tested with electronic instruments 33. A “myograph” (Para. 2, Line 1) is an electronic instrument that _. A) is able to design new tools B) measures the amoun

20、t of energy used C) enable people to see the muscular movement D) visualizes electrical signals 34. It can be inferred from the passage that _. A) a stepladder used to have four legs. B) it is dangerous to use tools C) a tripod is safer in a tool design D) workers are safer on production lines 35. D

21、r. Tichauer started his experiments initially to _. A) improve efficiency B) increase production C) reduce work load D) improve comfort TEXT B More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memor

22、ies. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment. Its easy for computer crimes to go undetected if no one checks up on what the computer i

23、s 共11页 第6页 doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers. Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were dete

24、cted by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishm

25、ent, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been

26、misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue hi

27、s crimes elsewhere. 36. It can be concluded from the passage that _. A) it is still impossible to detect computer crimes today B) people commit computer crimes at the request of their company C) computer criminals escape punishment because they cant be detected D) computer crimes are the most seriou

28、s problem in the operation of financial institutions 37. It is implied in the third paragraph that _. A) most computer criminals who are caught blame their bad luck B) the rapid increase of computer crimes is a troublesome problem C) most computer criminals are smart enough to cover up their crimes

29、D) many more computer crimes go undetected that are discovered 38. Which of the following statements is mentioned in the passage? A) A strict law against computer crimes must be enforced B) Companies usually hesitate to uncover computer crimes to protect their reputation C) Companies will guard agai

30、nst computer crimes to protect their reputation D) Companies need to impose restrictions on confidential information 39. What may happen to computer criminals once they are caught? A) With a bad reputation they can hardly find another job. B) They may walk away and easily find another job. C) They w

31、ill be denied access to confidential records D) They must leave the country to go to jail. 共11页 第7页 40. The passage is mainly about _. A) why computer criminals are often able to escape punishment B) why computer crimes are difficult to detect by systematic inspections C) how computer criminals mang

32、e to get good recommendations from their former employers D) why computer crimes cant be eliminated TEXT C It is 3 A.M. Everything on the university campus seems ghostlike in the quiet, misty darknesseverything except the computer center. Here, twenty students rumpled and bleary-eyed, sit transfixed

33、 at their consoles, tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world unto itself. These young computer “hackers“ are pursuing a kind of compulsi

34、on; a drive so consuming it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep

35、on sofas and lounge chairs in the computer center, trying to catch a few winks but loathe getting too far away from their beloved machines. Most of these students dont have to be at the computer center in the middle of the night. They arent working on assignments. They are there because they want to

36、 be - they are irresistibly drawn there. And they are not alone. There are hackers at computer centers all across the country. In their extreme form, they focus on nothing else. They flunk out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wande

37、r from one computer center to another. They may even forgo personal hygiene. “I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health, “says a computer science professor at MIT. Computer science teachers are now more aware

38、of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction that are already severe. They know that the case of the hackers is not just the story of one persons relationship with a machine. It is the story of a societys relationship to t

39、he so-called thinking machines, which are becoming almost everywhere. 41.We can learn from the passage that those at the computer center in the middle of the night are_. A) students working on a program B) students using computers to amuse themselves C) hard-working computer science majors D) studen

40、ts deeply fascinated by the computer 42. Which of the following is NOT true of those young computer “hackers“? A) Most of them are top students majoring in computer programming. 共11页 第8页 B) For them, computer programming is the sole purpose for their life. C) They can stay with the computer at the c

41、enter for nearly three days on end. D) Their “love“ for the computer is so deep that they want to be near their machines even when they sleep. 43. It can be reasonably inferred from the passage that _. A) the “hacker“ phenomenon exists only at university computer centers B) university computer cente

42、rs are open to almost everyone C) university computer centers are expecting outstanding programmers out of the “hackers“ D) the “hacker“ phenomenon is partly attributable to the deficiency of the computer centers 44. The authors attitude towards the “hacker“ phenomenon can be described as _. A) affi

43、rmative B) contemptuous C) anxious D) disgusted 45. Which of the following may be a most appropriate title for the passage? A) The Charm of Computer Science B) A New Type of Electronic Toys C) Compulsive Computer Programmers D) Computer Addicts TEXT D Public officials and candidates for public offic

44、e routinely use public opinion polls to keep track of what the people are thinking. An important question is the degree to which these polls should guide leaders in their actions. There are arguments for and against the use of polls as the basis for policy decisions. Polls can contribute to effectiv

45、e government by keeping political leaders from getting too far out of line with the publics thinking. In a democratic society, the effectiveness of a public policy often depends on the extent of its public support. When a policy is contrary to the publics desires, people may choose to disregard or u

46、ndermine it, thus making it counterproductive or inefficient. Further, when government pursues a course of action with which a large proportion of the public disagrees, it risks a loss of public confidence, which can have a negative effect on its ability to lead. The Reagan administration, flying hi

47、gh from 1981 to 1985, was brought low in 1986 by public reaction to news of its secret sales of weapons to Iran. The administration had not paid sufficient attention to polls that revealed the deep antagonism Americans still felt toward Iran because the Ayatollah Khomeinis regime had held sixty-thre

48、e American hostages in 1979-1981. However, leaders can also do a disservice to the public they represent by using poll results as a substitute for policy judgment. Effective government, as Walter Lippmann wrote, can not be conducted by legislators and officials who, when a question is presented, ask themselves first and last not what is the truth and which is the right and necessary course, but what does the Gallup Poll say? during his pres

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1