ImageVerifierCode 换一换
格式:DOC , 页数:24 ,大小:146KB ,
资源ID:1390543      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1390543.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【考研类试卷】南京大学考博英语-试卷4及答案解析.doc)为本站会员(周芸)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【考研类试卷】南京大学考博英语-试卷4及答案解析.doc

1、南京大学考博英语-试卷 4 及答案解析(总分:106.00,做题时间:90 分钟)一、Structure and Vocabu(总题数:20,分数:40.00)1._dull he may be, he is certainly a very successful top executive.(分数:2.00)A.AlthoughB.WhateverC.AsD.However2.If only I_play the guitar as well as you!(分数:2.00)A.wouldB.couldC.shouldD.might3.The party, _I was the guest

2、of honour, was extremely enjoyable.(分数:2.00)A.by whichB.for whichC.to whichD.at which4.Its high time we_cutting down the rainforests.(分数:2.00)A.stoppedB.had to stopC.shall stopD.stop5.The student said there were a few points in the essay he_impossible to comprehend.(分数:2.00)A.has foundB.was findingC

3、.had foundD.would find6.Loudspeakers were fixed in the hall so that everyone_an opportunity to hear the speech.(分数:2.00)A.ought to haveB.must haveC.may haveD.should have7.I am surprised_this city is a dull place to live in.(分数:2.00)A.that you should thinkB.by what you are thinkingC.that you would th

4、inkD.with what you were thinking8.Susan is very hardworking, but her pay is not_for her work.(分数:2.00)A.enough goodB.good enoughC.as good enoughD.good as enough9.It is imperative that the government_more investment into the shipbuilding industry.(分数:2.00)A.attractsB.shall attractC.attractD.has to10.

5、Land belongs to the city; there is_thing as private ownership of land.(分数:2.00)A.no such aB.not suchC.not such aD.no such11.My daughter has walked eight miles today. We never guessed that she could walk_far.(分数:2.00)A.soB.way moreC.thatD.this12.The statistics_that living standards in the area have i

6、mproved drastically in recent times.(分数:2.00)A.provesB.is provingC.are provingD.prove13.There are only ten apples left in the baskets, _the spoiltones.(分数:2.00)A.not countingB.not to countC.dont countD.having not counted14.It was_we had hoped.(分数:2.00)A.more a success thanB.a success more thanC.as m

7、uch of a success asD.a success as much as15.There used to be a petrol station near the park, _?(分数:2.00)A.didnt itB.doesnt thereC.usednt itD.didnt there16.It is an offence to show_against people of different races.(分数:2.00)A.distinctionB.differenceC.separationD.discrimination17.A great amount of wor

8、k has gone into_the Cathedral to its previous splendor.(分数:2.00)A.refreshingB.restoringC.renovatingD.renewing18.The thieves fled with the local police close on their_.(分数:2.00)A.backsB.necksC.toesD.heels19.The economic recession has meant that job_is a rare thing.(分数:2.00)A.securityB.safetyC.protect

9、ionD.secureness20.Many people nowadays save money to_for their old age.(分数:2.00)A.caterB.supplyC.provideD.equip二、Cloze(总题数:1,分数:20.00)Vitamins are organic compounds necessary in small amounts in the diet for the normal growth and maintenance of life of animals, including man. They do not provide ene

10、rgy, 【C1】_do they construct or build any part of the body. They are needed for【C2】_foods into energy and body maintenance. There are thirteen or more of them, and if 【C3】_is missing a deficiency disease becomes【C4】_. Vitamins are similar because they are made of the same elementsusually carbon, hydr

11、ogen, oxygen, and【C5】_nitrogen. They are different【C6】_their elements are arranged differently, and each vitamin【C7】_one or more specific functions in the body. 【C8】_enough vitamins is essential to life, although the body has no nutritional use for 【C9】_vitamins. Many people, 【C10】_, believe in bein

12、g on the “safe side“ and thus take extra vitamins. However, a well balanced diet will usually meet all the bodys vitamin needs.(分数:20.00)(1).【C1】(分数:2.00)A.eitherB.soC.norD.never(2).【C2】(分数:2.00)A.shiftingB.transferringC.alteringD.transforming(3).【C3】(分数:2.00)A.anyB.someC.anythingD.something(4).【C4】

13、(分数:2.00)A.seriousB.apparentC.severeD.fatal(5).【C5】(分数:2.00)A.mostlyB.partiallyC.sometimesD.rarely(6).【C6】(分数:2.00)A.in thatB.so thatC.such thatD.except that(7).【C7】(分数:2.00)A.undertakesB.holdsC.playsD.performs(8).【C8】(分数:2.00)A.SupplyingB.GettingC.ProvidingD.Furnishing(9).【C9】(分数:2.00)A.exceptional

14、B.exceedingC.excessD.external(10).【C10】(分数:2.00)A.neverthelessB.thereforeC.moreoverD.meanwhile三、Reading Comprehensio(总题数:5,分数:40.00)New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimite

15、d opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes. Theft of data, or data crime, has attracted the interest of organized criminal syndicates. Thi

16、s is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign n

17、ations. A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victi

18、m firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort t

19、o sabotage if the company is a competitor of a business owned or controlled by organized crime. Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologi

20、cally advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing. Computer vulnerability has been ampl

21、y documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation b

22、etween criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sa

23、botaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The compute

24、r may become the hit man of the twentieth century. The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to hand

25、le, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.(分数:8.00)(1).How many kinds of crimes are mentioned in the passage?(分数:2.00)A.7.B.8.C.9.D.10(2).What is the p

26、urpose of a competitor to sabotage a companys computer?(分数:2.00)A.His purpose is to destroy or weaken the firms operational ability.B.His purpose is to weaken firms competitive capability and get it.C.His purpose is to buy the rivals company at a relatively low price.D.His purpose is to steal import

27、ant data.(3).Which of the following can be labeled as a politically motivated sabotage of a computer system?(分数:2.00)A.Sabotage of a university computer.B.Sabotage of a hospital computer.C.Sabotage of a computer at a secret training base.D.Sabotage of a factory computer.(4).What does the author mean

28、 by “Homicide could take a new form“?(分数:2.00)A.There is no need to use a gun in killing a person.B.Criminals can kill whoever they want by a computer.C.The computer can replace any weapons.D.The function of a computer is just like a gun.The search for latent prints is done in a systematic and intel

29、ligent manner. Investigators develop techniques to locate traces of fingerprints at a crime scene. The basic premise in searching for latent prints is to examine more carefully those areas, which would most likely be touched by persons who have been on the scene. The natural manner in which a person

30、 would use and place his hands in making an entrance or exit from a building or in handling any object is the key to the discovery of latent prints. Where a forced entrance has been made, latent prints are likely to be found on any surface adjacent to or at that point. Any object with a smooth, non-

31、porous surface is likely to retain latent prints if touched. Fingerprints on rough surfaces are usually of little value. If the fingermark does not disclose ridge detail when viewed under a reading glass, the chances are that its value in identification is nil when photographed. Where fingermarks ar

32、e found, it will be necessary for the investigator to compare them against the ones of persons having legitimate access to the premises so that the traces might be eliminated as having evidentiary value if they prove to be from these persons. Places to search for prints on an automobile are the rear

33、 view mirror, steering wheel hub, steering column, windshield dashboard and the like. Dusting of surface may be done with a fine brush or with an atomizer. The whit powders used are basically finely powdered white lead, talc, or chalk. Another light powder is basically Chemists gray. A good black po

34、wder is composed of lampblack, graphite, and powdered acacia. Dragons blood is good powder for white surface and can be fixed on paper by heating. In developing latent prints, the accepted method is to use the powder sparingly and brush lightly. Do not use powder if the fingermark is visible under o

35、blique lighting. It can be photographed. A good policy for the novice is to experiment with his own prints on a surface similar to the one he wishes to search in order to determine the powder best suited to the surface. Fingerprints after dusting may be lifted by using fresh cellulose tape or commer

36、cially prepared material especially designed to lift and transfer dusted latent fingerprints. In addition to latent prints, the investigator must not overlook the possibility of two other types of fingerprint traces: molded impression and visible impression. Molded impressions are formed by the pres

37、sure of the finger upon comparatively soft, pliable, or plastic surfaces producing an actual mold of the fingerprint pattern. These can be recorded by photograph without treating the surface, is usually most effective in revealing the impressions clearly. Visible impressions are formed when the fing

38、er is covered with some substance which is transferred to the surface contacted. Fingers smeared with blood, grease, dirt, paint, and the like will leave a visible impression. If these impressions are clear and sharp, they are photographed under light without any treatment. Ordinarily, prints of thi

39、s type are blurred or smeared and do not contain enough detail for identification by comparison. However, they can not be overlooked or brushed aside without first being examined carefully.(分数:8.00)(1).What is the best title for this passage?(分数:2.00)A.Visible Impressions.B.Moulded Impressions.C.Fin

40、gerprints.D.Latent Fingerprints.(2).How many fingermarks are mentioned in this passage?(分数:2.00)A.2.B.3.C.4.D.5.(3).Which type of fingerprints is most likely to retain?(分数:2.00)A.Latent fingerprints.B.Visible impressions.C.Moulded impressions.D.Clear fingerprints.(4).How many ways are there to devel

41、op fingerprints?(分数:2.00)A.2.B.3C.4.D.5.These days we hear a lot of nonsense about the “great classless society“. The idea that the twentieth century is the age of the common man has become one of the great cliches of our time. The same old arguments are put forward in evidence. Here are some of the

42、m: monarchy as a system of government has been completely discredited. The monarchies that survive have been deprived of all political power. Inherited wealth has been savagely reduced by taxation and, in time, the great fortunes will disappear altogether. In a number of countries the victory has be

43、en complete. The people rule; the great millennium has become a political reality. But has it? Close examination doesnt bear out the claim. It is a fallacy to suppose that all men are equal and that society will be leveled out if you provide everybody with the same educational opportunities.(It is d

44、ebatable whether you can ever provide everyone with the same educational opportunities, but that is another question.)The fact is that nature dispenses brains and ability with a total disregard for the principle of equality. The old rules of the jungle, “survival of the fittest“ , and “might is righ

45、t“ are still with us. The spread of education has destroyed the old class system and created a new one. Rewards are based on merit. For “aristocracy“ read “meritocracy“ ; in other respects, society remains unaltered: the class system is rigidly maintained. Genuine ability, animal cunning, skill, the

46、 knack of seizing opportunities, all bring material rewards. And what is the first thing people do when they become rich? They use their wealth to secure the best possible opportunities for their children, to give them “ a good start in life“. For all the lip service we pay to the idea of equality,

47、we do not consider this wrong in the western world. Private schools which offer unfair advantages over state schools are not banned because one of the principles in a democracy is that people should be free to choose how they will educate their children. In this way, the new meritocracy can perpetua

48、te itself to a certain extent; an able child from a wealthy home can succeed far more rapidly than his poorer counterpart. Wealth is also used indiscriminately to further political ends. It would be almost impossible to become the leader of a democracy without massive financial backing. Money is as

49、powerful a weapon as ever it was. In societies wholly dedicated to the principle of social equality, privileged private education is forbidden. But even here people are rewarded according to their abilities. In fact, so great is the need for skilled workers that the least able may be neglected. Bright children are carefully and expensively trained to become future rulers. In the end, all political ideologies boil down to the sam

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1