ImageVerifierCode 换一换
格式:DOC , 页数:30 ,大小:91KB ,
资源ID:474852      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-474852.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc

1、南京大学考博英语模拟试卷 4及答案与解析 一、 Structure and Vocabulary 1 _dull he may be, he is certainly a very successful top executive. ( A) Although ( B) Whatever ( C) As ( D) However 2 If only I_play the guitar as well as you! ( A) would ( B) could ( C) should ( D) might 3 The party, _I was the guest of honour, was

2、extremely enjoyable. ( A) by which ( B) for which ( C) to which ( D) at which 4 Its high time we_cutting down the rainforests. ( A) stopped ( B) had to stop ( C) shall stop ( D) stop 5 The student said there were a few points in the essay he_impossible to comprehend. ( A) has found ( B) was finding

3、( C) had found ( D) would find 6 Loudspeakers were fixed in the hall so that everyone_an opportunity to hear the speech. ( A) ought to have ( B) must have ( C) may have ( D) should have 7 I am surprised_this city is a dull place to live in. ( A) that you should think ( B) by what you are thinking (

4、C) that you would think ( D) with what you were thinking 8 Susan is very hardworking, but her pay is not_for her work. ( A) enough good ( B) good enough ( C) as good enough ( D) good as enough 9 It is imperative that the government_more investment into the shipbuilding industry. ( A) attracts ( B) s

5、hall attract ( C) attract ( D) has to 10 Land belongs to the city; there is_thing as private ownership of land. ( A) no such a ( B) not such ( C) not such a ( D) no such 11 My daughter has walked eight miles today. We never guessed that she could walk_far. ( A) so ( B) way more ( C) that ( D) this 1

6、2 The statistics_that living standards in the area have improved drastically in recent times. ( A) proves ( B) is proving ( C) are proving ( D) prove 13 There are only ten apples left in the baskets, _the spoiltones. ( A) not counting ( B) not to count ( C) dont count ( D) having not counted 14 It w

7、as_we had hoped. ( A) more a success than ( B) a success more than ( C) as much of a success as ( D) a success as much as 15 There used to be a petrol station near the park, _? ( A) didnt it ( B) doesnt there ( C) usednt it ( D) didnt there 16 It is an offence to show_against people of different rac

8、es. ( A) distinction ( B) difference ( C) separation ( D) discrimination 17 A great amount of work has gone into_the Cathedral to its previous splendor. ( A) refreshing ( B) restoring ( C) renovating ( D) renewing 18 The thieves fled with the local police close on their_. ( A) backs ( B) necks ( C)

9、toes ( D) heels 19 The economic recession has meant that job_is a rare thing. ( A) security ( B) safety ( C) protection ( D) secureness 20 Many people nowadays save money to_for their old age. ( A) cater ( B) supply ( C) provide ( D) equip 二、 Cloze 20 Vitamins are organic compounds necessary in smal

10、l amounts in the diet for the normal growth and maintenance of life of animals, including man. They do not provide energy, 【 C1】 _do they construct or build any part of the body. They are needed for【 C2】 _foods into energy and body maintenance. There are thirteen or more of them, and if 【 C3】 _is mi

11、ssing a deficiency disease becomes【 C4】 _. Vitamins are similar because they are made of the same elements usually carbon, hydrogen, oxygen, and【 C5】 _nitrogen. They are different【 C6】 _their elements are arranged differently, and each vitamin【 C7】 _one or more specific functions in the body. 【 C8】

12、_enough vitamins is essential to life, although the body has no nutritional use for 【 C9】 _vitamins. Many people, 【 C10】 _, believe in being on the “safe side“ and thus take extra vitamins. However, a well balanced diet will usually meet all the bodys vitamin needs. 21 【 C1】 ( A) either ( B) so ( C)

13、 nor ( D) never 22 【 C2】 ( A) shifting ( B) transferring ( C) altering ( D) transforming 23 【 C3】 ( A) any ( B) some ( C) anything ( D) something 24 【 C4】 ( A) serious ( B) apparent ( C) severe ( D) fatal 25 【 C5】 ( A) mostly ( B) partially ( C) sometimes ( D) rarely 26 【 C6】 ( A) in that ( B) so th

14、at ( C) such that ( D) except that 27 【 C7】 ( A) undertakes ( B) holds ( C) plays ( D) performs 28 【 C8】 ( A) Supplying ( B) Getting ( C) Providing ( D) Furnishing 29 【 C9】 ( A) exceptional ( B) exceeding ( C) excess ( D) external 30 【 C10】 ( A) nevertheless ( B) therefore ( C) moreover ( D) meanwhi

15、le 三、 Reading Comprehension 30 New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage

16、, politically related sabotage, vandalism, crimes against the individual and financially related crimes. Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exist

17、s for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations. A competitor sabotages a companys computer system to destroy or cripple the firms operational

18、 ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations,

19、 sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. Polit

20、ically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer f

21、acility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing. Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems

22、are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in a

23、ssassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they

24、had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century. The computer opens vast areas of crime to organize

25、d criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer

26、technology, law enforcement has not. Many still think in terms of traditional criminology. 31 How many kinds of crimes are mentioned in the passage? ( A) 7. ( B) 8. ( C) 9. ( D) 10 32 What is the purpose of a competitor to sabotage a companys computer? ( A) His purpose is to destroy or weaken the fi

27、rms operational ability. ( B) His purpose is to weaken firms competitive capability and get it. ( C) His purpose is to buy the rivals company at a relatively low price. ( D) His purpose is to steal important data. 33 Which of the following can be labeled as a politically motivated sabotage of a comp

28、uter system? ( A) Sabotage of a university computer. ( B) Sabotage of a hospital computer. ( C) Sabotage of a computer at a secret training base. ( D) Sabotage of a factory computer. 34 What does the author mean by “Homicide could take a new form“? ( A) There is no need to use a gun in killing a per

29、son. ( B) Criminals can kill whoever they want by a computer. ( C) The computer can replace any weapons. ( D) The function of a computer is just like a gun. 34 The search for latent prints is done in a systematic and intelligent manner. Investigators develop techniques to locate traces of fingerprin

30、ts at a crime scene. The basic premise in searching for latent prints is to examine more carefully those areas, which would most likely be touched by persons who have been on the scene. The natural manner in which a person would use and place his hands in making an entrance or exit from a building o

31、r in handling any object is the key to the discovery of latent prints. Where a forced entrance has been made, latent prints are likely to be found on any surface adjacent to or at that point. Any object with a smooth, non-porous surface is likely to retain latent prints if touched. Fingerprints on r

32、ough surfaces are usually of little value. If the fingermark does not disclose ridge detail when viewed under a reading glass, the chances are that its value in identification is nil when photographed. Where fingermarks are found, it will be necessary for the investigator to compare them against the

33、 ones of persons having legitimate access to the premises so that the traces might be eliminated as having evidentiary value if they prove to be from these persons. Places to search for prints on an automobile are the rear view mirror, steering wheel hub, steering column, windshield dashboard and th

34、e like. Dusting of surface may be done with a fine brush or with an atomizer. The whit powders used are basically finely powdered white lead, talc, or chalk. Another light powder is basically Chemists gray. A good black powder is composed of lampblack, graphite, and powdered acacia. Dragons blood is

35、 good powder for white surface and can be fixed on paper by heating. In developing latent prints, the accepted method is to use the powder sparingly and brush lightly. Do not use powder if the fingermark is visible under oblique lighting. It can be photographed. A good policy for the novice is to ex

36、periment with his own prints on a surface similar to the one he wishes to search in order to determine the powder best suited to the surface. Fingerprints after dusting may be lifted by using fresh cellulose tape or commercially prepared material especially designed to lift and transfer dusted laten

37、t fingerprints. In addition to latent prints, the investigator must not overlook the possibility of two other types of fingerprint traces: molded impression and visible impression. Molded impressions are formed by the pressure of the finger upon comparatively soft, pliable, or plastic surfaces produ

38、cing an actual mold of the fingerprint pattern. These can be recorded by photograph without treating the surface, is usually most effective in revealing the impressions clearly. Visible impressions are formed when the finger is covered with some substance which is transferred to the surface contacte

39、d. Fingers smeared with blood, grease, dirt, paint, and the like will leave a visible impression. If these impressions are clear and sharp, they are photographed under light without any treatment. Ordinarily, prints of this type are blurred or smeared and do not contain enough detail for identificat

40、ion by comparison. However, they can not be overlooked or brushed aside without first being examined carefully. 35 What is the best title for this passage? ( A) Visible Impressions. ( B) Moulded Impressions. ( C) Fingerprints. ( D) Latent Fingerprints. 36 How many fingermarks are mentioned in this p

41、assage? ( A) 2. ( B) 3. ( C) 4. ( D) 5. 37 Which type of fingerprints is most likely to retain? ( A) Latent fingerprints. ( B) Visible impressions. ( C) Moulded impressions. ( D) Clear fingerprints. 38 How many ways are there to develop fingerprints? ( A) 2. ( B) 3 ( C) 4. ( D) 5. 38 These days we h

42、ear a lot of nonsense about the “great classless society“. The idea that the twentieth century is the age of the common man has become one of the great cliches of our time. The same old arguments are put forward in evidence. Here are some of them: monarchy as a system of government has been complete

43、ly discredited. The monarchies that survive have been deprived of all political power. Inherited wealth has been savagely reduced by taxation and, in time, the great fortunes will disappear altogether. In a number of countries the victory has been complete. The people rule; the great millennium has

44、become a political reality. But has it? Close examination doesnt bear out the claim. It is a fallacy to suppose that all men are equal and that society will be leveled out if you provide everybody with the same educational opportunities.(It is debatable whether you can ever provide everyone with the

45、 same educational opportunities, but that is another question.)The fact is that nature dispenses brains and ability with a total disregard for the principle of equality. The old rules of the jungle, “survival of the fittest“ , and “might is right“ are still with us. The spread of education has destr

46、oyed the old class system and created a new one. Rewards are based on merit. For “aristocracy“ read “meritocracy“ ; in other respects, society remains unaltered: the class system is rigidly maintained. Genuine ability, animal cunning, skill, the knack of seizing opportunities, all bring material rew

47、ards. And what is the first thing people do when they become rich? They use their wealth to secure the best possible opportunities for their children, to give them “ a good start in life“. For all the lip service we pay to the idea of equality, we do not consider this wrong in the western world. Pri

48、vate schools which offer unfair advantages over state schools are not banned because one of the principles in a democracy is that people should be free to choose how they will educate their children. In this way, the new meritocracy can perpetuate itself to a certain extent; an able child from a wea

49、lthy home can succeed far more rapidly than his poorer counterpart. Wealth is also used indiscriminately to further political ends. It would be almost impossible to become the leader of a democracy without massive financial backing. Money is as powerful a weapon as ever it was. In societies wholly dedicated to the principle of social equality, privileged private education is forbidden. But even here people are rewarded a

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1