[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc

上传人:王申宇 文档编号:474852 上传时间:2018-12-01 格式:DOC 页数:30 大小:91KB
下载 相关 举报
[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc_第1页
第1页 / 共30页
[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc_第2页
第2页 / 共30页
[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc_第3页
第3页 / 共30页
[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc_第4页
第4页 / 共30页
[外语类试卷]南京大学考博英语模拟试卷4及答案与解析.doc_第5页
第5页 / 共30页
点击查看更多>>
资源描述

1、南京大学考博英语模拟试卷 4及答案与解析 一、 Structure and Vocabulary 1 _dull he may be, he is certainly a very successful top executive. ( A) Although ( B) Whatever ( C) As ( D) However 2 If only I_play the guitar as well as you! ( A) would ( B) could ( C) should ( D) might 3 The party, _I was the guest of honour, was

2、extremely enjoyable. ( A) by which ( B) for which ( C) to which ( D) at which 4 Its high time we_cutting down the rainforests. ( A) stopped ( B) had to stop ( C) shall stop ( D) stop 5 The student said there were a few points in the essay he_impossible to comprehend. ( A) has found ( B) was finding

3、( C) had found ( D) would find 6 Loudspeakers were fixed in the hall so that everyone_an opportunity to hear the speech. ( A) ought to have ( B) must have ( C) may have ( D) should have 7 I am surprised_this city is a dull place to live in. ( A) that you should think ( B) by what you are thinking (

4、C) that you would think ( D) with what you were thinking 8 Susan is very hardworking, but her pay is not_for her work. ( A) enough good ( B) good enough ( C) as good enough ( D) good as enough 9 It is imperative that the government_more investment into the shipbuilding industry. ( A) attracts ( B) s

5、hall attract ( C) attract ( D) has to 10 Land belongs to the city; there is_thing as private ownership of land. ( A) no such a ( B) not such ( C) not such a ( D) no such 11 My daughter has walked eight miles today. We never guessed that she could walk_far. ( A) so ( B) way more ( C) that ( D) this 1

6、2 The statistics_that living standards in the area have improved drastically in recent times. ( A) proves ( B) is proving ( C) are proving ( D) prove 13 There are only ten apples left in the baskets, _the spoiltones. ( A) not counting ( B) not to count ( C) dont count ( D) having not counted 14 It w

7、as_we had hoped. ( A) more a success than ( B) a success more than ( C) as much of a success as ( D) a success as much as 15 There used to be a petrol station near the park, _? ( A) didnt it ( B) doesnt there ( C) usednt it ( D) didnt there 16 It is an offence to show_against people of different rac

8、es. ( A) distinction ( B) difference ( C) separation ( D) discrimination 17 A great amount of work has gone into_the Cathedral to its previous splendor. ( A) refreshing ( B) restoring ( C) renovating ( D) renewing 18 The thieves fled with the local police close on their_. ( A) backs ( B) necks ( C)

9、toes ( D) heels 19 The economic recession has meant that job_is a rare thing. ( A) security ( B) safety ( C) protection ( D) secureness 20 Many people nowadays save money to_for their old age. ( A) cater ( B) supply ( C) provide ( D) equip 二、 Cloze 20 Vitamins are organic compounds necessary in smal

10、l amounts in the diet for the normal growth and maintenance of life of animals, including man. They do not provide energy, 【 C1】 _do they construct or build any part of the body. They are needed for【 C2】 _foods into energy and body maintenance. There are thirteen or more of them, and if 【 C3】 _is mi

11、ssing a deficiency disease becomes【 C4】 _. Vitamins are similar because they are made of the same elements usually carbon, hydrogen, oxygen, and【 C5】 _nitrogen. They are different【 C6】 _their elements are arranged differently, and each vitamin【 C7】 _one or more specific functions in the body. 【 C8】

12、_enough vitamins is essential to life, although the body has no nutritional use for 【 C9】 _vitamins. Many people, 【 C10】 _, believe in being on the “safe side“ and thus take extra vitamins. However, a well balanced diet will usually meet all the bodys vitamin needs. 21 【 C1】 ( A) either ( B) so ( C)

13、 nor ( D) never 22 【 C2】 ( A) shifting ( B) transferring ( C) altering ( D) transforming 23 【 C3】 ( A) any ( B) some ( C) anything ( D) something 24 【 C4】 ( A) serious ( B) apparent ( C) severe ( D) fatal 25 【 C5】 ( A) mostly ( B) partially ( C) sometimes ( D) rarely 26 【 C6】 ( A) in that ( B) so th

14、at ( C) such that ( D) except that 27 【 C7】 ( A) undertakes ( B) holds ( C) plays ( D) performs 28 【 C8】 ( A) Supplying ( B) Getting ( C) Providing ( D) Furnishing 29 【 C9】 ( A) exceptional ( B) exceeding ( C) excess ( D) external 30 【 C10】 ( A) nevertheless ( B) therefore ( C) moreover ( D) meanwhi

15、le 三、 Reading Comprehension 30 New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage

16、, politically related sabotage, vandalism, crimes against the individual and financially related crimes. Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exist

17、s for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations. A competitor sabotages a companys computer system to destroy or cripple the firms operational

18、 ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations,

19、 sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. Polit

20、ically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer f

21、acility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing. Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems

22、are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in a

23、ssassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they

24、had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century. The computer opens vast areas of crime to organize

25、d criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer

26、technology, law enforcement has not. Many still think in terms of traditional criminology. 31 How many kinds of crimes are mentioned in the passage? ( A) 7. ( B) 8. ( C) 9. ( D) 10 32 What is the purpose of a competitor to sabotage a companys computer? ( A) His purpose is to destroy or weaken the fi

27、rms operational ability. ( B) His purpose is to weaken firms competitive capability and get it. ( C) His purpose is to buy the rivals company at a relatively low price. ( D) His purpose is to steal important data. 33 Which of the following can be labeled as a politically motivated sabotage of a comp

28、uter system? ( A) Sabotage of a university computer. ( B) Sabotage of a hospital computer. ( C) Sabotage of a computer at a secret training base. ( D) Sabotage of a factory computer. 34 What does the author mean by “Homicide could take a new form“? ( A) There is no need to use a gun in killing a per

29、son. ( B) Criminals can kill whoever they want by a computer. ( C) The computer can replace any weapons. ( D) The function of a computer is just like a gun. 34 The search for latent prints is done in a systematic and intelligent manner. Investigators develop techniques to locate traces of fingerprin

30、ts at a crime scene. The basic premise in searching for latent prints is to examine more carefully those areas, which would most likely be touched by persons who have been on the scene. The natural manner in which a person would use and place his hands in making an entrance or exit from a building o

31、r in handling any object is the key to the discovery of latent prints. Where a forced entrance has been made, latent prints are likely to be found on any surface adjacent to or at that point. Any object with a smooth, non-porous surface is likely to retain latent prints if touched. Fingerprints on r

32、ough surfaces are usually of little value. If the fingermark does not disclose ridge detail when viewed under a reading glass, the chances are that its value in identification is nil when photographed. Where fingermarks are found, it will be necessary for the investigator to compare them against the

33、 ones of persons having legitimate access to the premises so that the traces might be eliminated as having evidentiary value if they prove to be from these persons. Places to search for prints on an automobile are the rear view mirror, steering wheel hub, steering column, windshield dashboard and th

34、e like. Dusting of surface may be done with a fine brush or with an atomizer. The whit powders used are basically finely powdered white lead, talc, or chalk. Another light powder is basically Chemists gray. A good black powder is composed of lampblack, graphite, and powdered acacia. Dragons blood is

35、 good powder for white surface and can be fixed on paper by heating. In developing latent prints, the accepted method is to use the powder sparingly and brush lightly. Do not use powder if the fingermark is visible under oblique lighting. It can be photographed. A good policy for the novice is to ex

36、periment with his own prints on a surface similar to the one he wishes to search in order to determine the powder best suited to the surface. Fingerprints after dusting may be lifted by using fresh cellulose tape or commercially prepared material especially designed to lift and transfer dusted laten

37、t fingerprints. In addition to latent prints, the investigator must not overlook the possibility of two other types of fingerprint traces: molded impression and visible impression. Molded impressions are formed by the pressure of the finger upon comparatively soft, pliable, or plastic surfaces produ

38、cing an actual mold of the fingerprint pattern. These can be recorded by photograph without treating the surface, is usually most effective in revealing the impressions clearly. Visible impressions are formed when the finger is covered with some substance which is transferred to the surface contacte

39、d. Fingers smeared with blood, grease, dirt, paint, and the like will leave a visible impression. If these impressions are clear and sharp, they are photographed under light without any treatment. Ordinarily, prints of this type are blurred or smeared and do not contain enough detail for identificat

40、ion by comparison. However, they can not be overlooked or brushed aside without first being examined carefully. 35 What is the best title for this passage? ( A) Visible Impressions. ( B) Moulded Impressions. ( C) Fingerprints. ( D) Latent Fingerprints. 36 How many fingermarks are mentioned in this p

41、assage? ( A) 2. ( B) 3. ( C) 4. ( D) 5. 37 Which type of fingerprints is most likely to retain? ( A) Latent fingerprints. ( B) Visible impressions. ( C) Moulded impressions. ( D) Clear fingerprints. 38 How many ways are there to develop fingerprints? ( A) 2. ( B) 3 ( C) 4. ( D) 5. 38 These days we h

42、ear a lot of nonsense about the “great classless society“. The idea that the twentieth century is the age of the common man has become one of the great cliches of our time. The same old arguments are put forward in evidence. Here are some of them: monarchy as a system of government has been complete

43、ly discredited. The monarchies that survive have been deprived of all political power. Inherited wealth has been savagely reduced by taxation and, in time, the great fortunes will disappear altogether. In a number of countries the victory has been complete. The people rule; the great millennium has

44、become a political reality. But has it? Close examination doesnt bear out the claim. It is a fallacy to suppose that all men are equal and that society will be leveled out if you provide everybody with the same educational opportunities.(It is debatable whether you can ever provide everyone with the

45、 same educational opportunities, but that is another question.)The fact is that nature dispenses brains and ability with a total disregard for the principle of equality. The old rules of the jungle, “survival of the fittest“ , and “might is right“ are still with us. The spread of education has destr

46、oyed the old class system and created a new one. Rewards are based on merit. For “aristocracy“ read “meritocracy“ ; in other respects, society remains unaltered: the class system is rigidly maintained. Genuine ability, animal cunning, skill, the knack of seizing opportunities, all bring material rew

47、ards. And what is the first thing people do when they become rich? They use their wealth to secure the best possible opportunities for their children, to give them “ a good start in life“. For all the lip service we pay to the idea of equality, we do not consider this wrong in the western world. Pri

48、vate schools which offer unfair advantages over state schools are not banned because one of the principles in a democracy is that people should be free to choose how they will educate their children. In this way, the new meritocracy can perpetuate itself to a certain extent; an able child from a wea

49、lthy home can succeed far more rapidly than his poorer counterpart. Wealth is also used indiscriminately to further political ends. It would be almost impossible to become the leader of a democracy without massive financial backing. Money is as powerful a weapon as ever it was. In societies wholly dedicated to the principle of social equality, privileged private education is forbidden. But even here people are rewarded a

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 外语考试

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1