欢迎来到考研文库! | 帮助中心 分享价值,成长自我!

考研文库

全部分类
  • 考研公共资源>
    考研公共资源
    研招公告 考研新闻 考研政治 考研英语 考研数学 考研二外 考博文库 保研文库 四六级文库 托福文库 雅思文库 GRE文库 小语种文库 公考文库 教资文库 法考文库 注会文库 医考文库 艺考文库 经济学 管理学 法学 政治学 社会学 文学 历史学 哲学 新闻传播学 心理学 教育学 外国语言文学 艺术学 物理学 化学 生物学 计算机 电子信息 通信工程 自动化 土木工程 天文地理 轻工纺织 石油能源 航空航天 交通运输 核能工程 仪器仪表 建筑学 材料学 环境科学 食品科学 农学林学 医学药学
  • 北京地区高校>
    北京地区高校
    北京大学 清华大学 中国人民大学 北京师范大学 中国传媒大学 对外经济贸易大学 北京航空航天大学 北京理工大学 中国农业大学 北京交通大学 北京工业大学 北京科技大学 北京化工大学 北京邮电大学 北京林业大学 北京协和医学院 北京中医药大学 首都医科大学 首都师范大学 北京外国语大学 北京语言大学 中央财经大学 外交学院 中国人民公安大学 北京体育大学 中央音乐学院 中国音乐学院 中央美术学院 中央戏剧学院 中央民族大学 中国政法大学 中国科学院大学 华北电力大学 中国矿业大学(北京) 中国石油大学(北京) 中国地质大学(北京) 五道口金融学院 中国财政科学研究院 国际关系学院 北京第二外国语学院 北京大学医学部 中国青年政治学院 中共中央党校 北京工商大学 北京建筑大学 北京信息科技大学 北京联合大学 北京电影学院 北京城市学院
  • 华北地区高校>
    华北地区高校
    南开大学 天津大学 天津师范大学 天津医科大学 天津工业大学 天津科技大学 天津理工大学 天津中医药大学 中国民航大学 天津商业大学 天津财经大学 天津外国语大学 天津美术学院 天津音乐学院 河北大学 燕山大学 河北工业大学 华北理工大学 河北科技大学 河北工程大学 河北经贸大学 河北医科大学 河北师范大学 太原理工大学 山西大学 中北大学 山西财经大学 山西医科大学 太原科技大学 山西师范大学 山西中医药大学 内蒙古大学 内蒙古科技大学 内蒙古师范大学 内蒙古工业大学 内蒙古财经大学 内蒙古医科大学 内蒙古民族大学 山东大学 中国海洋大学 中国石油大学(华东) 齐鲁工业大学 山东师范大学 山东农业大学 山东科技大学 山东财经大学 青岛大学 济南大学 青岛科技大学 郑州大学 河南大学 河南师范大学 河南农业大学 河南理工大学 河南工业大学 曲阜师范大学
  • 华东地区高校>
    华东地区高校
    复旦大学 上海交通大学 上海大学 同济大学 华东师范大学 上海外国语大学 华东理工大学 上海财经大学 东华大学 华东政法大学 上海戏剧学院 上海中医药大学 上海理工大学 上海师范大学 上海海事大学 上海工程技术大学 上海海洋大学 上海应用技术大学 上海对外经贸大学 上海电力大学 上海体育学院 上海科技大学 上海音乐学院 南京大学 东南大学 苏州大学 南京师范大学 中国矿业大学 中国药科大学 河海大学 南京理工大学 江南大学 南京农业大学 南京航空航天大学 江苏大学 南京工业大学 中国药科大学 扬州大学 南京林业大学 南京医科大学 南京中医药大学 南京邮电大学 江苏师范大学 浙江大学 宁波大学 浙江工业大学 浙江师范大学 杭州电子科技大学 浙江工商大学 浙江理工大学 杭州师范大学 中国计量大学 浙江财经大学 厦门大学 福州大学 福建师范大学 华侨大学 集美大学 中国科学技术大学 安徽大学 合肥工业大学 安徽师范大学 南昌大学 江西师范大学 江西财经大学 江西理工大学 华东交通大学 阜阳师范大学 烟台大学
  • 华南地区高校>
    华南地区高校
    武汉大学 华中科技大学 中国地质大学(武汉) 华中师范大学 华中农业大学 中南财经政法大学 武汉理工大学 武汉科技大学 中南民族大学 湖北大学 长江大学 武汉工程大学 湖北工业大学 湖南大学 中南大学 湖南师范大学 湘潭大学 长沙理工大学 中山大学 华南理工大学 暨南大学 华南师范大学 华南农业大学 深圳大学 广东工业大学 南方医科大学 广州大学 广东外语外贸大学 汕头大学 广州中医药大学 广州医科大学 广东财经大学 广西大学 广西师范大学 广西师范大学 桂林电子科技大学 桂林理工大学 广西医科大学 广西民族大学 海南大学 海南师范大学 国防科技大学 闽南师范大学 湖南农业大学
  • 西北地区高校>
    西北地区高校
    西安交通大学 西北大学 西北工业大学 陕西师范大学 西北农林科技大学 西安电子科技大学 长安大学 西安理工大学 西安建筑科技大学 西安科技大学 陕西科技大学 西北政法大学 西北师范大学 兰州大学 兰州理工大学 兰州交通大学 西北民族大学 宁夏大学 青海大学 宁夏医科大学 北方民族大学 新疆大学 石河子大学 新疆医科大学 新疆师范大学 新疆财经大学
  • 西南地区高校>
    西南地区高校
    四川大学 电子科技大学 西南交通大学 西南财经大学 四川农业大学 成都理工大学 西南石油大学 四川师范大学 成都中医药大学 西南科技大学 西华大学 西华师范大学 西南民族大学 重庆大学 西南大学 西南政法大学 重庆医科大学 重庆交通大学 重庆邮电大学 重庆工商大学 重庆师范大学 重庆理工大学 云南大学 昆明理工大学 云南师范大学 云南民族大学 云南农业大学 云南财经大学 昆明医科大学 贵州大学 贵州师范大学 贵州财经大学 贵州医科大学 贵州民族大学 西藏大学 西藏民族大学
  • 东北地区高校>
    东北地区高校
    大连理工大学 东北大学 辽宁大学 大连海事大学 东北财经大学 中国医科大学 大连大学 辽宁师范大学 沈阳工业大学 大连医科大学 大连工业大学 沈阳建筑大学 沈阳师范大学 吉林大学 东北师范大学 延边大学 长春理工大学 长春工业大学 东北电力大学 北华大学 吉林师范大学 吉林财经大学 长春大学 长春师范大学 黑龙江大学 哈尔滨工业大学 哈尔滨工程大学 东北农业大学 东北林业大学 哈尔滨医科大学 哈尔滨理工大学 哈尔滨师范大学 东北石油大学 黑龙江中医药大学 哈尔滨商业大学
  • 换一换
    首页 考研文库 > 资源分类 > PDF文档下载
     

    2015电子科技大学翻译硕士英语真题.pdf

    • 资源ID:18764       资源大小:63.55KB        全文页数:11页
    • 资源格式: PDF        下载积分:2金币 【人民币2元】
    会员登录下载
    账号:
    密码:
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2015电子科技大学翻译硕士英语真题.pdf

    共11页 第1页 电子科技大学 2015年攻读硕士学位研究生入学考试试题 考试科目: 211 翻译硕士英语 注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。 Part I Grammar at the age of three he performed his first experiment. A) intricate B) indignant C) incidental D) inquisitive 10. The current political _ of our country is favourable for foreign investments. A) climate B) temperature C) weather D) state 11. The purpose of the survey was to _ the inspectors with local conditions. A) inform B) notify C) instruct D) acquaint 12. The motorist had to _ to avoid knocking the old woman down in the middle of the road.A) swerve B) twist C) depart D) swing 13. Xiao Yan was somewhat short-sighted; she had the habit of _ at people. A) glancing B) peering C) gazing D) scanning 14. Even though the evidence is so overwhelming, if one juror is still _, the case must be retried. A) present B) surprised C) skeptical D) hungry 15. The contents of the box must _ to the description on the label. A) yield B) appeal C) correspond D) relate 16. I have no objection _ your story again. A) to hear B) to hearing C) to having heard D) to have heard 共11页 第3页 17. You will see this product _ wherever you go. A) to be advertised B) advertised C) advertise D) advertising 18. Such crimes may be so complex that months or years go by before anyone _ them. A) discovered B) will discover C) would have discovered D) discovers 19. While crossing the mountain area, all the men carried guns lest they _ by wild animals. A) should be attacked B) had been attacked C) must be attacked D) would be attacked 20. It was not until it was getting dark _ the child remembered to go back home. A) when B) had C) that D) then 21. The newly developing science of artificial intelligence aims at programming the computer to think, reason and react _ people do. A) by the same way as B) in much the same way that C) with the same way as D) as much as the same way that 22. The residents _ had been damaged by the fire were given help by the Red Cross. A) all of their homes B) all their homes C) whose all homes D) all of whose homes 23. Contrast may make something appear more beautiful than it is when _ alone. A) seen B) is seen C) to be seen D) having been seen 24. Sometimes children have trouble _ fact from fiction and may believe that such things actually exist. A) to separate B) separating C) for separating D) of separating 25. Things might have been much worse if the mother _ on her right to keep the baby. A) has been insisting B) had insisted C) would insist D) insisted 26. Many a delegate was in favor of his proposal that a special committee _ to investigate the incident. A) were set up B) was set up C) be set up D) set up 共11页 第4页 27. _ the increase in air fares, most people still prefer to travel by plane. A) No matter how B) Regardless C) Though D) Despite 28. I don t think it is funny, but my friend _. A) cannot help to laugh B) cannot help laugh C) cannot but laughing D) cannot help but laugh 29. _, China's large and medium-sized state enterprises need to improve their management right now. A) As it should be B) As it must be C) As it is D) As it were 30. The budget they made is unrealistic _ it disregards increased costs. A) for that B) for which C) in that D) in which Part II Reading Comprehension (1.5x20 + 1x10 = 40 Points) In this section there are five reading passages followed by a total of 20 multiple-choice questions and 5 short answer questions. Please read the passages and then write your answers on the ANSWER SHEET. TEXT A Design of all the new tools and implements is based on careful experiments with electronic instruments. First, a human “guinea pig” is tested using a regular tool. Measurements are taken of the amount of work done, and the buildup of heat in the body. Twisted joints and stretched muscles can not perform as well, it has been found, as joints and muscles in their normal positions. The same person is then tested again, using a tool designed according to the suggestions made by Dr. Tichauer. All these tests have shown the great improvement of the new designs over the old. One of the electronic instruments used by Dr. Tichauer, the myograph, makes visible through electrical signals the work done by human muscle. Another machine measures any dangerous features of tools, thus proving information upon which to base a new design. One conclusion of tests made with this machine is that a tripod stepladder is more stable and safer to use than one with four legs. This work has attracted the attention of efficiency experts and time-and-motion-study engineers, but its value goes far beyond that. Dr. Tichauers first thought is for the health of the tool user. With the repeated use of the same tool all day long on production lines and in other jobs, even light manual work can put a heavy stress on one small area of the body. In time, such stress can 共11页 第5页 cause a disabling disease. Furthermore, muscle fatigue is a serious safety hazard. Efficiency is the by-product of comfort, Dr. Tichauer believes, and his new designs for traditional tools have proved his point. 31. What are involved in the design of a new tool according to the passage? A) Electronic instruments and a regular tool. B) A human “guinea pig” and a regular tool. C) Electronic instruments and a human “guinea pig”. D) Electronic instruments, a human “guinea pig” and a regular tool. 32. From the passage we know that joints and muscles perform best when _. A) they are twisted and stretched B) they are in their normal positions C) they are tested with a human “guinea pig” D) they are tested with electronic instruments 33. A “myograph” (Para. 2, Line 1) is an electronic instrument that _. A) is able to design new tools B) measures the amount of energy used C) enable people to see the muscular movement D) visualizes electrical signals 34. It can be inferred from the passage that _. A) a stepladder used to have four legs. B) it is dangerous to use tools C) a tripod is safer in a tool design D) workers are safer on production lines 35. Dr. Tichauer started his experiments initially to _. A) improve efficiency B) increase production C) reduce work load D) improve comfort TEXT B More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment. Its easy for computer crimes to go undetected if no one checks up on what the computer is 共11页 第6页 doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers. Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere. 36. It can be concluded from the passage that _. A) it is still impossible to detect computer crimes today B) people commit computer crimes at the request of their company C) computer criminals escape punishment because they cant be detected D) computer crimes are the most serious problem in the operation of financial institutions 37. It is implied in the third paragraph that _. A) most computer criminals who are caught blame their bad luck B) the rapid increase of computer crimes is a troublesome problem C) most computer criminals are smart enough to cover up their crimes D) many more computer crimes go undetected that are discovered 38. Which of the following statements is mentioned in the passage? A) A strict law against computer crimes must be enforced B) Companies usually hesitate to uncover computer crimes to protect their reputation C) Companies will guard against computer crimes to protect their reputation D) Companies need to impose restrictions on confidential information 39. What may happen to computer criminals once they are caught? A) With a bad reputation they can hardly find another job. B) They may walk away and easily find another job. C) They will be denied access to confidential records D) They must leave the country to go to jail. 共11页 第7页 40. The passage is mainly about _. A) why computer criminals are often able to escape punishment B) why computer crimes are difficult to detect by systematic inspections C) how computer criminals mange to get good recommendations from their former employers D) why computer crimes cant be eliminated TEXT C It is 3 A.M. Everything on the university campus seems ghostlike in the quiet, misty darknesseverything except the computer center. Here, twenty students rumpled and bleary-eyed, sit transfixed at their consoles, tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world unto itself. These young computer “hackers“ are pursuing a kind of compulsion; a drive so consuming it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep on sofas and lounge chairs in the computer center, trying to catch a few winks but loathe getting too far away from their beloved machines. Most of these students don't have to be at the computer center in the middle of the night. They aren't working on assignments. They are there because they want to be - they are irresistibly drawn there. And they are not alone. There are hackers at computer centers all across the country. In their extreme form, they focus on nothing else. They flunk out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to another. They may even forgo personal hygiene. “I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health, “says a computer science professor at MIT. Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction that are already severe. They know that the case of the hackers is not just the story of one person's relationship with a machine. It is the story of a society's relationship to the so-called thinking machines, which are becoming almost everywhere. 41.We can learn from the passage that those at the computer center in the middle of the night are_. A) students working on a program B) students using computers to amuse themselves C) hard-working computer science majors D) students deeply fascinated by the computer 42. Which of the following is NOT true of those young computer “hackers“? A) Most of them are top students majoring in computer programming. 共11页 第8页 B) For them, computer programming is the sole purpose for their life. C) They can stay with the computer at the center for nearly three days on end. D) Their “love“ for the computer is so deep that they want to be near their machines even when they sleep. 43. It can be reasonably inferred from the passage that _. A) the “hacker“ phenomenon exists only at university computer centers B) university computer centers are open to almost everyone C) university computer centers are expecting outstanding programmers out of the “hackers“ D) the “hacker“ phenomenon is partly attributable to the deficiency of the computer centers 44. The author's attitude towards the “hacker“ phenomenon can be described as _. A) affirmative B) contemptuous C) anxious D) disgusted 45. Which of the following may be a most appropriate title for the passage? A) The Charm of Computer Science B) A New Type of Electronic Toys C) Compulsive Computer Programmers D) Computer Addicts TEXT D Public officials and candidates for public office routinely use public opinion polls to keep track of what the people are thinking. An important question is the degree to which these polls should guide leaders in their actions. There are arguments for and against the use of polls as the basis for policy decisions. Polls can contribute to effective government by keeping political leaders from getting too far out of line with the publics thinking. In a democratic society, the effectiveness of a public policy often depends on the extent of its public support. When a policy is contrary to the publics desires, people may choose to disregard or undermine it, thus making it counterproductive or inefficient. Further, when government pursues a course of action with which a large proportion of the public disagrees, it risks a loss of public confidence, which can have a negative effect on its ability to lead. The Reagan administration, flying high from 1981 to 1985, was brought low in 1986 by public reaction to news of its secret sales of weapons to Iran. The administration had not paid sufficient attention to polls that revealed the deep antagonism Americans still felt toward Iran because the Ayatollah Khomeinis regime had held sixty-three American hostages in 1979-1981. However, leaders can also do a disservice to the public they represent by using poll results as a substitute for po

    注意事项

    本文(2015电子科技大学翻译硕士英语真题.pdf)为本站会员(叶雄)主动上传,考研文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知考研文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    1111
    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2018 kaoyanwenku.com网站版权所有
    经营许可证编号:鄂ICP备20009915号-2

    x