[外语类试卷]考博英语模拟试卷173及答案与解析.doc

上传人:confusegate185 文档编号:485736 上传时间:2018-11-30 格式:DOC 页数:31 大小:92KB
下载 相关 举报
[外语类试卷]考博英语模拟试卷173及答案与解析.doc_第1页
第1页 / 共31页
[外语类试卷]考博英语模拟试卷173及答案与解析.doc_第2页
第2页 / 共31页
[外语类试卷]考博英语模拟试卷173及答案与解析.doc_第3页
第3页 / 共31页
[外语类试卷]考博英语模拟试卷173及答案与解析.doc_第4页
第4页 / 共31页
[外语类试卷]考博英语模拟试卷173及答案与解析.doc_第5页
第5页 / 共31页
点击查看更多>>
资源描述

1、考博英语模拟试卷 173及答案与解析 一、 Structure and Vocabulary 1 The machine needs a complete _ since it has been in use for over ten years. ( A) amending ( B) fitting ( C) mending ( D) renovating 2 There were many people present and he appeared only for a few seconds, so I only caught a _ of him. ( A) glance ( B)

2、glimpse ( C) look ( D) sight 3 I dont think its wise of you to_ your greater knowledge in front of the director, for it may offend him. ( A) show up ( B) show out ( C) show in ( D) show off 4 The returns in the short _ may be small, but over a number of years the in- vestment will be well repaid. (

3、A) interval ( B) range ( C) span ( D) term 5 A thorough study of biology requires _ with the properties of trees and plants, and the habit of birds and beasts. ( A) acquisition ( B) discrimination ( C) curiosity ( D) familiarity 6 She worked hard at her task before she felt sure that the results wou

4、ld _ her long effort. ( A) justify ( B) testify ( C) rectify ( D) verify 7 Im very glad to know that my boss has generously agreed to _ my debt in return for certain services. ( A) take away ( B) cut out ( C) write off ( D) clear up 8 Some journalists often overstate the situation so that their news

5、 may create a great _. ( A) explosion ( B) sensation ( C) exaggeration ( D) stimulation 9 According to what you have just said, am I to understand that his new post _ no responsibility with it at all? ( A) shoulders ( B) possesses ( C) carries ( D) shares 10 Sometimes the student may be asked to wri

6、te about his _ to a certain book or article that has some bearing on the subject being studied. ( A) comment ( B) reaction ( C) impression ( D) comprehension 11 Although the accident did yew little _ to the car, I still suggest that you drive more carefully next time. ( A) demolishment ( B) ruin ( C

7、) destruction ( D) damage 12 We had to _ a lot of noise when the children were at home. ( A) go in for ( B) hold on to ( C) put up with ( D) keep pace with 13 Criticism and self-criticism are necessary _ they help us to find and correct our mistakes. ( A) by that ( B) at that ( C) on that ( D) in th

8、at 14 However, at times this balance in nature is _, resulting in a number of possibly unforeseen effects. ( A) troubled ( B) disturbed ( C) confused ( D) puzzled 15 He offered to _ her a hand as the suitcase was too heavy for her to carry. ( A) help ( B) show ( C) lend ( D) borrow 16 The patients h

9、ealth failed to such an extent that he was put into care. ( A) tense ( B) rigid ( C) intensive ( D) tight 17 A persons calorie requirements vary _ his life. ( A) across ( B) throughout ( C) over ( D) within 18 Generous public funding of basic science would _ considerable benefits for the countrys he

10、alth, wealth and security. ( A) lead to ( B) result from ( C) lie in ( D) settle down 19 In a time of social reform, peoples state of mind tends to keep _ with the rapid changes of society. ( A) step ( B) progress ( C) pace ( D) touch 20 Harry was _ by a bee when he was collecting the honey. ( A) st

11、ung ( B) stuck ( C) bitten ( D) scratched 二、 Cloze 20 In the past few decades, remarkable findings have been made in ethology, the study of animal social behavior. Earlier scientists had【 21】 that nonhuman social life was almost totally instinctive or fixed by genetics. Much more careful observation

12、 has shown that【 22】 variation occurs among the social ties of most species, showing that earning is a part of social life. That is, the【 23】 are not solely fixed by the genes.【 24】 , the learning that occurs is often at an early age in a process that is called imprinting. Imprinting is clearly【 25】

13、 instinctive, but it is not quite like the learning of humans, it is something in between the two. An illustration best【 26】 the nature of imprinting. Once, biologists thought that ducklings followed the mother duck because of instincts. Now we know that. shortly【 27】 they hatch, ducklings fix【 28】

14、any object about the size of a duck and will henceforth follow it. So ducklings may follow a basketball or a briefcase if these are【 29】 for the mother duck at the time when imprinting occurs. Thus, social ties can be considerably【 30】 , even ones that have a considerable base【 31】 by genetics. Even

15、 among the social insects something like imprinting【 32】 influence social behavior. For example, biologists once thought bees communicated with others purely【 33】 instinct. But, in examining a “dance“ that bees do to indicate the distance and direction of a pollen source, observers found that bees r

16、aised in isolation could not communicate effectively. At a higher level, the genetic base seems to be much more for an all-purpose learning rather than the more specific responses of imprinting. Chimpanzees, for instance, generally【 34】 very good mother but Jane Goodall reports that some chimps carr

17、y the infant. upside down or【 35】 fail to nurture the young. ( A) assumed ( B) adopted ( C) believed ( D) surmised ( A) considerate ( B) considered ( C) considerable ( D) considering ( A) statues ( B) statuses ( C) statutes ( D) statures ( A) Whats more ( B) Hence ( C) But ( D) However ( A) not ( B)

18、 only ( C) but ( D) solely ( A) clarifies ( B) classifies ( C) defines ( D) outlines ( A) than ( B) before ( C) when ( D) after ( A) on ( B) with ( C) in ( D) within ( A) appropriated ( B) substituted ( C) assigned ( D) distributed ( A) varied ( B) deviated ( C) differed ( D) altered ( A) fashioned

19、( B) modified ( C) influenced ( D) affected ( A) may ( B) should ( C) must ( D) can ( A) by ( B) out of ( C) from ( D) through ( A) prove ( B) make ( C) turn ( D) create ( A) otherwise ( B) still ( C) yet ( D) even 三、 Reading Comprehension 35 Today cognitive theorists empirically study the impact of

20、 feelings on cognitive processes such as memory and judgment and also the reciprocal influence of cognition on emotion. However, evolutionary theorists view emotion as a powerful source of motivation-an internal communication that something must be done. For example, when people are threatened, they

21、 feel fear, which in turn leads them to deal with the threatening situation through either fight or flight. Emotions and drives may also operate in tandem to motivate action, as when excitement accompanies sexual arousal. From an evolutionary perspective, different emotions serve different functions

22、. Fear facilitates flight in the face of danger; disgust prevents ingestion of potentially toxic substances such as rotting meat. An emotion that is less well understood is jealousy. Why do people become jealous in intimate sexual relationships? One series of studies tested evolutionary hypotheses a

23、bout differences in the concerns men and women have about their partners fidelity. Since females can have only a limited number of children during their lifetimes, to maximize their reproductive success they should be motivated to form relationships with males who have resources and will contribute

24、them to their offspring. Indeed, cross-cultural evidence demonstrates that one of the main mate selection criteria used by females around the world is mate resources. From a females point of view, then, infidelity accompanied by emotional commitment to the other woman is a major threat to resources.

25、 A man unlikely to divert re- sources from his mate and her offspring to a casual fling, but the risk increases dramatically if he becomes emotionally involved and perhaps considers switching long-term partners. Hence, a womans jealousy would be expected to focus on her mates emotional commitment to

26、 another female. For males, the situation is different. If a male commits himself to an exclusive relationship with a female, he must be certain that the offspring in whom he is investing are his own. Since he cannot be sure of paternity, the best he can do is to prevent his mate from copulating wit

27、h any other males. In males, then, jealousy would be expected to focus less on the females emotional commitment or resources and more on her tendency to give other males sexual access. Indeed, in species ranging from insects to humans, males take extreme measures to prevent other males from insemina

28、ting their mates. In humans, male sexual jealousy is the leading cause of homicides and of spouse battering cross-culturally. 36 This passage discusses the _ approach to human emotions. ( A) evolutionary ( B) cognitive ( C) psychological ( D) economic 37 Evolutionary theorists view emotion as all of

29、 the following except _. ( A) cognitive processes ( B) a source of motivation ( C) something promoting action ( D) serving various functions 38 The idea presented in the 2nd paragraph can be best described as _. ( A) realistic ( B) materialistic ( C) ironical ( D) offspring-oriented 39 According to

30、the evolutionary perspective, womens jealousy ultimately stems from _. ( A) concern over their husbands reproductive ability ( B) fear that their husbands resources would be threatened ( C) their husbands divided attention to them and their offspring ( D) their emotional instability resulting from t

31、heir husbands infidelity 40 According to this passage, a mans jealousy is mainly focused on _. ( A) a concern over their wives resources ( B) the fatherhood of the offspring to whom he is investing ( C) their mates emotional commitment ( D) the legitimacy of their marriage 40 While hackers with moti

32、ves make headlines, they represent less than 20% of all net- work security breaches. More common are instances of authorized users accidentally winding up where they should not be and inadvertently deleting or changing data. However, the Internet introduces another concern: some Internet surfers are

33、 bound to go where they have no business and, in so doing, threaten to wipe out data to which they should not have access. Before picking a firewall, companies need to adopt security policies. A security policy states who or what is allowed to connect to whom or what. You can group all users by depa

34、rtment or classification. The better firewall products let you drag and drop groups in a graphical user interface (GUI) environment to define network security easily. Two methods are most often used together to establish an Internet firewall. They are application and circuit gateways, as well as pac

35、ket filtering. With application and circuit gateways, all packets are addressed to a user-level application on a gate-way that relays packets between two points. With most application gateways, additional packet-filter machines are required to control and screen traffic between the gateway and the n

36、etworks. A typical configuration includes two routers. With a bastion host that serves as the application gateway sitting between them. A drawback to application and circuit gateways is that they slow network performance. This is because each packet must be copied and processed at least twice by all

37、 the communication layers. Packet-filter gateways, which act as routers between two nets, are less secure than application gateways but more efficient. They are transparent to many protocols and applications, and they require no changes in client applications, no specific application management or i

38、nstallation, and no extra hardware. Using a single, unified packet-filter engine, all net traffic is processed and then for- warded or blocked from a single point of control. However, most packet filters are state- less, understand only low-level protocols, and are difficult to configure and verity.

39、 In addition, they lack audit mechanisms. Some packet filters are implemented inside routers, limiting computing power and filtering capabilities. Others are implemented as s9ftware packages that filter the packets in application-layer processes, an inefficient approach that requires multiple data c

40、opies, expensive delays and context switches and delivers lower throughput. So whats a network administrator to do? Some vendors are developing firewalls that overcome many of these problems and combine the advantages of application gateways and packet filtering. These efficient, protocol-independen

41、t, secure firewall engines are capable of application-level security, user authentication, unified support, and handling of all protocols, auditing and altering. They are transparent to users and to system setup, and include a GUI for simple and flexible system management and configuration. 41 The m

42、ost suitable title for this passage is _. ( A) Hackers and Our Defense ( B) Internet Surfers Guide ( C) Firewall: A Measure of Network Security ( D) Information Technology 42 According to what you have read, the authors probable preference will he _. ( A) walling for the coming of better firewall pr

43、oducts, ( B) finding a combination of both application gateway and packet filtering approach ( C) meeting demands of every type with better products ( D) implementing one better approach in the adoption of a firewall solution 43 In choosing a firewall product, what is implied as the main concern of

44、the author? ( A) Management. ( B) Transparency. ( C) Independence. ( D) Efficiency. 44 Which of the following can be inferred from the passage concerning the networks using application and circuit gateways? ( A) Secure and speedy. ( B) Secure but slow. ( C) Insecure and slow. ( D) Insecure but speed

45、y. 45 For whom is this passage most likely written? ( A) Government officials. ( B) Hackers. ( C) Network. administrators. ( D) Computer experts. 45 The Internet is a global network that connects other computer networks, together with software and protocols for controlling the movement of data. The

46、Internet, often referred to as “the Net“, was initiated in 1969 by a group of universities and private research groups funded by the US Department of Defense. It now covers almost every country in the world. Its organization is informal and deliberately nonpolitical; its controllers tend to concentr

47、ate on technical aspects rather than on administrative control. The Internet offers users a number of basic services including data transfer, electronic mail, and the ability to access information in remote databases. A notable feature is the existence of user groups, which allow people to exchange

48、information and debate specific subjects of interest. In addition, there are a number of high-level services. For example, MBONE allows the transmission of messages to more than one destination. It is used in videoconferencing. The World Wide Web, known as “the Web“, is another high level Internet s

49、ervice, developed in the 1990s in Geneva. It is a service for distributing multimedia information, including graphics, pictures, sounds, and video as well as text. A feature of the World Wide Web is that it allows links to other related documents elsewhere on the Internet. Documents for publication on the Web are presented in a form known as HTML (hypertext mark up language). This allows a specification of the page layout and typogra

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 外语考试

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1