ImageVerifierCode 换一换
格式:DOC , 页数:27 ,大小:146KB ,
资源ID:1387836      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1387836.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【考研类试卷】考博英语-3及答案解析.doc)为本站会员(towelfact221)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【考研类试卷】考博英语-3及答案解析.doc

1、考博英语-3 及答案解析(总分:88.00,做题时间:90 分钟)一、BPart Vocabula(总题数:20,分数:10.00)1.I dont think its wise of you to_ your greater knowledge in front of the director, for it may offend him.(分数:0.50)A.show upB.show outC.show inD.show off2.According to what you have just said, am I to understand that his new post _ no

2、 responsibility with it at all?(分数:0.50)A.shouldersB.possessesC.carriesD.shares3.The machine needs a complete _ since it has been in use for over ten years.(分数:0.50)A.amendingB.fittingC.mendingD.renovating4.He offered to _ her a hand as the suitcase was too heavy for her to carry.(分数:0.50)A.helpB.sh

3、owC.lendD.borrow5.The patients health failed to such an extent that he was put into care.(分数:0.50)A.tenseB.rigidC.intensiveD.tight6.She worked hard at her task before she felt sure that the results would _ her long effort.(分数:0.50)A.justifyB.testifyC.rectifyD.verify7.A persons calorie requirements v

4、ary _ his life.(分数:0.50)A.acrossB.throughoutC.overD.within8.Criticism and self-criticism are necessary _ they help us to find and correct our mistakes.(分数:0.50)A.by thatB.at thatC.on thatD.in that9.Some journalists often overstate the situation so that their news may create a great _.(分数:0.50)A.expl

5、osionB.sensationC.exaggerationD.stimulation10.We had to _ a lot of noise when the children were at home.(分数:0.50)A.go in forB.hold on toC.put up withD.keep pace with11.However, at times this balance in nature is _, resulting in a number of possibly unforeseen effects.(分数:0.50)A.troubledB.disturbedC.

6、confusedD.puzzled12.A thorough study of biology requires _ with the properties of trees and plants, and the habit of birds and beasts.(分数:0.50)A.acquisitionB.discriminationC.curiosityD.familiarity13.There were many people present and he appeared only for a few seconds, so I only caught a _ of him.(分

7、数:0.50)A.glanceB.glimpseC.lookD.sight14.Im very glad to know that my boss has generously agreed to _ my debt in return for certain services.(分数:0.50)A.take awayB.cut outC.write offD.clear up15.Sometimes the student may be asked to write about his _ to a certain book or article that has some bearing

8、on the subject being studied.(分数:0.50)A.commentB.reactionC.impressionD.comprehension16.In a time of social reform, peoples state of mind tends to keep _ with the rapid changes of society.(分数:0.50)A.stepB.progressC.paceD.touch17.Harry was _ by a bee when he was collecting the honey.(分数:0.50)A.stungB.

9、stuckC.bittenD.scratched18.Although the accident did yew little _ to the car, I still suggest that you drive more carefully next time.(分数:0.50)A.demolishmentB.ruinC.destructionD.damage19.The returns in the short _ may be small, but over a number of years the in- vestment will be well repaid.(分数:0.50

10、)A.intervalB.rangeC.spanD.term20.Generous public funding of basic science would _ considerable benefits for the countrys health, wealth and security.(分数:0.50)A.lead toB.result fromC.lie inD.settle down二、BPart Cloze/(总题数:1,分数:15.00)In the past few decades, remarkable findings have been made in etholo

11、gy, the study of animal social behavior. Earlier scientists hadU (21) /Uthat nonhuman social life was almost totally instinctive or fixed by genetics. Much more careful observation has shown thatU (22) /Uvariation occurs among the social ties of most species, showing that earning is a part of social

12、 life. That is, theU (23) /Uare not solely fixed by the genes.U (24) /U, the learning that occurs is often at an early age in a process that is called imprinting. Imprinting is clearlyU (25) /Uinstinctive, but it is not quite like the learning of humans, it is something in between the two. An illust

13、ration bestU (26) /Uthe nature of imprinting. Once, biologists thought that ducklings followed the mother duck because of instincts. Now we know that. shortlyU (27) /Uthey hatch, ducklings fixU (28) /Uany object about the size of a duck and will henceforth follow it. So ducklings may follow a basket

14、ball or a briefcase if these areU (29) /Ufor the mother duck at the time when imprinting occurs. Thus, social ties can be considerablyU (30) /U, even ones that have a considerable baseU (31) /Uby genetics.Even among the social insects something like imprintingU (32) /Uinfluence social behavior. For

15、example, biologists once thought bees communicated with others purelyU (33) /Uinstinct. But, in examining a “dance“ that bees do to indicate the distance and direction of a pollen source, observers found that bees raised in isolation could not communicate effectively. At a higher level, the genetic

16、base seems to be much more for an all-purpose learning rather than the more specific responses of imprinting. Chimpanzees, for instance, generallyU (34) /Uvery good mother but Jane Goodall reports that some chimps carry the infant. upside down orU (35) /Ufail to nurture the young.(分数:15.00)A.assumed

17、B.adoptedC.believedD.surmisedA.considerateB.consideredC.considerableD.consideringA.statuesB.statusesC.statutesD.staturesA.Whats moreB.HenceC.ButD.HoweverA.notB.onlyC.butD.solelyA.clarifiesB.classifiesC.definesD.outlinesA.thanB.beforeC.whenD.afterA.onB.withC.inD.withinA.appropriatedB.substitutedC.ass

18、ignedD.distributedA.variedB.deviatedC.differedD.alteredA.fashionedB.modifiedC.influencedD.affectedA.mayB.shouldC.mustD.canA.byB.out ofC.fromD.throughA.proveB.makeC.turnD.createA.otherwiseB.stillC.yetD.even三、BPart Reading (总题数:4,分数:40.00)BPassage 1/BToday cognitive theorists empirically study the imp

19、act of feelings on cognitive processes such as memory and judgment and also the reciprocal influence of cognition on emotion. However, evolutionary theorists view emotion as a powerful source of motivation-an internal communication that something must be done. For example, when people are threatened

20、, they feel fear, which in turn leads them to deal with the threatening situation through either fight or flight. Emotions and drives may also operate in tandem to motivate action, as when excitement accompanies sexual arousal. From an evolutionary perspective, different emotions serve different fun

21、ctions. Fear facilitates flight in the face of danger; disgust prevents ingestion of potentially toxic substances such as rotting meat.An emotion that is less well understood is jealousy. Why do people become jealous in intimate sexual relationships? One series of studies tested evolutionary hypothe

22、ses about differences in the concerns men and women have about their partners fidelity. Since females can have only a limited number of children during their lifetimes, to maximize their reproductive success they should be motivated to form relationships with males who have resources and will contri

23、bute them to their offspring. Indeed, cross-cultural evidence demonstrates that one of the main mate selection criteria used by females around the world is mate resources. From a females point of view, then, infidelity accompanied by emotional commitment to the other woman is a major threat to resou

24、rces. A man unlikely to divert re- sources from his mate and her offspring to a casual fling, but the risk increases dramatically if he becomes emotionally involved and perhaps considers switching long-term partners. Hence, a womans jealousy would be expected to focus on her mates emotional commitme

25、nt to another female.For males, the situation is different. If a male commits himself to an exclusive relationship with a female, he must be certain that the offspring in whom he is investing are his own. Since he cannot be sure of paternity, the best he can do is to prevent his mate from copulating

26、 with any other males. In males, then, jealousy would be expected to focus less on the females emotional commitment or resources and more on her tendency to give other males sexual access. Indeed, in species ranging from insects to humans, males take extreme measures to prevent other males from inse

27、minating their mates. In humans, male sexual jealousy is the leading cause of homicides and of spouse battering cross-culturally.(分数:10.00)(1).This passage discusses the _ approach to human emotions.(分数:2.00)A.evolutionaryB.cognitiveC.psychologicalD.economic(2).Evolutionary theorists view emotion as

28、 all of the following except _.(分数:2.00)A.cognitive processesB.a source of motivationC.something promoting actionD.serving various functions(3).The idea presented in the 2nd paragraph can be best described as _.(分数:2.00)A.realisticB.materialisticC.ironicalD.offspring-oriented(4).According to the evo

29、lutionary perspective, womens jealousy ultimately stems from _.(分数:2.00)A.concern over their husbands reproductive abilityB.fear that their husbands resources would be threatenedC.their husbands divided attention to them and their offspringD.their emotional instability resulting from their husbands

30、infidelity(5).According to this passage, a mans jealousy is mainly focused on _.(分数:2.00)A.a concern over their wives resourcesB.the fatherhood of the offspring to whom he is investingC.their mates emotional commitmentD.the legitimacy of their marriageBPassage 2/BWhile hackers with motives make head

31、lines, they represent less than 20% of all net- work security breaches. More common are instances of authorized users accidentally winding up where they should not be and inadvertently deleting or changing data. However, the Internet introduces another concern: some Internet surfers are bound to go

32、where they have no business and, in so doing, threaten to wipe out data to which they should not have access.Before picking a firewall, companies need to adopt security policies. A security policy states who or what is allowed to connect to whom or what. You can group all users by department or clas

33、sification. The better firewall products let you drag and drop groups in a graphical user interface (GUI) environment to define network security easily.Two methods are most often used together to establish an Internet firewall. They are application and circuit gateways, as well as packet filtering.

34、With application and circuit gateways, all packets are addressed to a user-level application on a gate-way that relays packets between two points. With most application gateways, additional packet-filter machines are required to control and screen traffic between the gateway and the networks. A typi

35、cal configuration includes two routers. With a bastion host that serves as the application gateway sitting between them.A drawback to application and circuit gateways is that they slow network performance. This is because each packet must be copied and processed at least twice by all the communicati

36、on layers. Packet-filter gateways, which act as routers between two nets, are less secure than application gateways but more efficient. They are transparent to many protocols and applications, and they require no changes in client applications, no specific application management or installation, and

37、 no extra hardware.Using a single, unified packet-filter engine, all net traffic is processed and then for- warded or blocked from a single point of control. However, most packet filters are state- less, understand only low-level protocols, and are difficult to configure and verity. In addition, the

38、y lack audit mechanisms. Some packet filters are implemented inside routers, limiting computing power and filtering capabilities. Others are implemented as s9ftware packages that filter the packets in application-layer processes, an inefficient approach that requires multiple data copies, expensive

39、delays and context switches and delivers lower throughput.So whats a network administrator to do? Some vendors are developing firewalls that overcome many of these problems and combine the advantages of application gateways and packet filtering. These efficient, protocol-independent, secure firewall

40、 engines are capable of application-level security, user authentication, unified support, and handling of all protocols, auditing and altering. They are transparent to users and to system setup, and include a GUI for simple and flexible system management and configuration.(分数:10.00)(1).The most suit

41、able title for this passage is _.(分数:2.00)A.Hackers and Our DefenseB.Internet Surfers GuideC.Firewall: A Measure of Network SecurityD.Information Technology(2).According to what you have read, the authors probable preference will he _.(分数:2.00)A.walling for the coming of better firewall products,B.f

42、inding a combination of both application gateway and packet filtering approachC.meeting demands of every type with better productsD.implementing one better approach in the adoption of a firewall solution(3).In choosing a firewall product, what is implied as the main concern of the author?(分数:2.00)A.

43、Management.B.Transparency.C.Independence.D.Efficiency.(4).Which of the following can be inferred from the passage concerning the networks using application and circuit gateways?(分数:2.00)A.Secure and speedy.B.Secure but slow.C.Insecure and slow.D.Insecure but speedy.(5).For whom is this passage most

44、likely written?(分数:2.00)A.Government officials.B.Hackers.C.Network. administrators.D.Computer experts.BPassage 3/BThe Internet is a global network that connects other computer networks, together with software and protocols for controlling the movement of data. The Internet, often referred to as “the

45、 Net“, was initiated in 1969 by a group of universities and private research groups funded by the US Department of Defense. It now covers almost every country in the world. Its organization is informal and deliberately nonpolitical; its controllers tend to concentrate on technical aspects rather tha

46、n on administrative control.The Internet offers users a number of basic services including data transfer, electronic mail, and the ability to access information in remote databases. A notable feature is the existence of user groups, which allow people to exchange information and debate specific subj

47、ects of interest. In addition, there are a number of high-level services. For example, MBONE allows the transmission of messages to more than one destination. It is used in videoconferencing. The World Wide Web, known as “the Web“, is another high level Internet service, developed in the 1990s in Ge

48、neva. It is a service for distributing multimedia information, including graphics, pictures, sounds, and video as well as text. A feature of the World Wide Web is that it allows links to other related documents elsewhere on the Internet. Documents for publication on the Web are presented in a form known as HTML (hypertext mark up language). This allows a specification of the page layout and typography as it will appear on the screen. It also allows the inclusion of active links to other documents. Generally, these appear on the screen display as highlighted text or as additi

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1