欢迎来到考研文库! | 帮助中心 分享价值,成长自我!

考研文库

全部分类
  • 考研公共资源>
    考研公共资源
    研招公告 考研新闻 考研政治 考研英语 考研数学 考研二外 考博文库 保研文库 四六级文库 托福文库 雅思文库 GRE文库 小语种文库 公考文库 教资文库 法考文库 注会文库 医考文库 艺考文库 经济学 管理学 法学 政治学 社会学 文学 历史学 哲学 新闻传播学 心理学 教育学 外国语言文学 艺术学 物理学 化学 生物学 计算机 电子信息 通信工程 自动化 土木工程 天文地理 轻工纺织 石油能源 航空航天 交通运输 核能工程 仪器仪表 建筑学 材料学 环境科学 食品科学 农学林学 医学药学
  • 北京地区高校>
    北京地区高校
    北京大学 清华大学 中国人民大学 北京师范大学 中国传媒大学 对外经济贸易大学 北京航空航天大学 北京理工大学 中国农业大学 北京交通大学 北京工业大学 北京科技大学 北京化工大学 北京邮电大学 北京林业大学 北京协和医学院 北京中医药大学 首都医科大学 首都师范大学 北京外国语大学 北京语言大学 中央财经大学 外交学院 中国人民公安大学 北京体育大学 中央音乐学院 中国音乐学院 中央美术学院 中央戏剧学院 中央民族大学 中国政法大学 中国科学院大学 华北电力大学 中国矿业大学(北京) 中国石油大学(北京) 中国地质大学(北京) 五道口金融学院 中国财政科学研究院 国际关系学院 北京第二外国语学院 北京大学医学部 中国青年政治学院 中共中央党校 北京工商大学 北京建筑大学 北京信息科技大学 北京联合大学 北京电影学院 北京城市学院
  • 华北地区高校>
    华北地区高校
    南开大学 天津大学 天津师范大学 天津医科大学 天津工业大学 天津科技大学 天津理工大学 天津中医药大学 中国民航大学 天津商业大学 天津财经大学 天津外国语大学 天津美术学院 天津音乐学院 河北大学 燕山大学 河北工业大学 华北理工大学 河北科技大学 河北工程大学 河北经贸大学 河北医科大学 河北师范大学 太原理工大学 山西大学 中北大学 山西财经大学 山西医科大学 太原科技大学 山西师范大学 山西中医药大学 内蒙古大学 内蒙古科技大学 内蒙古师范大学 内蒙古工业大学 内蒙古财经大学 内蒙古医科大学 内蒙古民族大学 山东大学 中国海洋大学 中国石油大学(华东) 齐鲁工业大学 山东师范大学 山东农业大学 山东科技大学 山东财经大学 青岛大学 济南大学 青岛科技大学 郑州大学 河南大学 河南师范大学 河南农业大学 河南理工大学 河南工业大学 曲阜师范大学
  • 华东地区高校>
    华东地区高校
    复旦大学 上海交通大学 上海大学 同济大学 华东师范大学 上海外国语大学 华东理工大学 上海财经大学 东华大学 华东政法大学 上海戏剧学院 上海中医药大学 上海理工大学 上海师范大学 上海海事大学 上海工程技术大学 上海海洋大学 上海应用技术大学 上海对外经贸大学 上海电力大学 上海体育学院 上海科技大学 上海音乐学院 南京大学 东南大学 苏州大学 南京师范大学 中国矿业大学 中国药科大学 河海大学 南京理工大学 江南大学 南京农业大学 南京航空航天大学 江苏大学 南京工业大学 中国药科大学 扬州大学 南京林业大学 南京医科大学 南京中医药大学 南京邮电大学 江苏师范大学 浙江大学 宁波大学 浙江工业大学 浙江师范大学 杭州电子科技大学 浙江工商大学 浙江理工大学 杭州师范大学 中国计量大学 浙江财经大学 厦门大学 福州大学 福建师范大学 华侨大学 集美大学 中国科学技术大学 安徽大学 合肥工业大学 安徽师范大学 南昌大学 江西师范大学 江西财经大学 江西理工大学 华东交通大学 阜阳师范大学 烟台大学
  • 华南地区高校>
    华南地区高校
    武汉大学 华中科技大学 中国地质大学(武汉) 华中师范大学 华中农业大学 中南财经政法大学 武汉理工大学 武汉科技大学 中南民族大学 湖北大学 长江大学 武汉工程大学 湖北工业大学 湖南大学 中南大学 湖南师范大学 湘潭大学 长沙理工大学 中山大学 华南理工大学 暨南大学 华南师范大学 华南农业大学 深圳大学 广东工业大学 南方医科大学 广州大学 广东外语外贸大学 汕头大学 广州中医药大学 广州医科大学 广东财经大学 广西大学 广西师范大学 广西师范大学 桂林电子科技大学 桂林理工大学 广西医科大学 广西民族大学 海南大学 海南师范大学 国防科技大学 闽南师范大学 湖南农业大学
  • 西北地区高校>
    西北地区高校
    西安交通大学 西北大学 西北工业大学 陕西师范大学 西北农林科技大学 西安电子科技大学 长安大学 西安理工大学 西安建筑科技大学 西安科技大学 陕西科技大学 西北政法大学 西北师范大学 兰州大学 兰州理工大学 兰州交通大学 西北民族大学 宁夏大学 青海大学 宁夏医科大学 北方民族大学 新疆大学 石河子大学 新疆医科大学 新疆师范大学 新疆财经大学
  • 西南地区高校>
    西南地区高校
    四川大学 电子科技大学 西南交通大学 西南财经大学 四川农业大学 成都理工大学 西南石油大学 四川师范大学 成都中医药大学 西南科技大学 西华大学 西华师范大学 西南民族大学 重庆大学 西南大学 西南政法大学 重庆医科大学 重庆交通大学 重庆邮电大学 重庆工商大学 重庆师范大学 重庆理工大学 云南大学 昆明理工大学 云南师范大学 云南民族大学 云南农业大学 云南财经大学 昆明医科大学 贵州大学 贵州师范大学 贵州财经大学 贵州医科大学 贵州民族大学 西藏大学 西藏民族大学
  • 东北地区高校>
    东北地区高校
    大连理工大学 东北大学 辽宁大学 大连海事大学 东北财经大学 中国医科大学 大连大学 辽宁师范大学 沈阳工业大学 大连医科大学 大连工业大学 沈阳建筑大学 沈阳师范大学 吉林大学 东北师范大学 延边大学 长春理工大学 长春工业大学 东北电力大学 北华大学 吉林师范大学 吉林财经大学 长春大学 长春师范大学 黑龙江大学 哈尔滨工业大学 哈尔滨工程大学 东北农业大学 东北林业大学 哈尔滨医科大学 哈尔滨理工大学 哈尔滨师范大学 东北石油大学 黑龙江中医药大学 哈尔滨商业大学
  • 换一换
    首页 考研文库 > 资源分类 > PDF文档下载
     

    2016年电子科技大学244 英语考研真题.pdf

    • 资源ID:25151       资源大小:384.56KB        全文页数:13页
    • 资源格式: PDF        下载积分:2金币 【人民币2元】
    会员登录下载
    账号:
    密码:
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2016年电子科技大学244 英语考研真题.pdf

    共 13 页 第 1 页 电子科技大学 2016 年攻读硕士学位研究生入学考试试题 考试科目: 244 英语 (二外 仅日语方向 ) 注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。 Part I Reading Comprehension (40%) Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C) and D). You should decide on the best choice and then write the corresponding letter on the Answer Sheet Passage One Questions 1 to 5 are based on the following passage. A recurring criticism of the UK's university sector is its perceived weakness in translating new knowledge into new products and services. Recently, the UK National Stem Cell Network warned the UK could lose its place among the world leaders in stem cell research unless adequate funding and legislation could be assured. We should take this concern seriously as universities are key in the national innovation system. However, we do have to challenge the unthinking complaint that the sector does not do enough in taking ideas to market. The most recent comparative data on the performance of universities and research institutions in Australia, Canada, USA and UK shows that, from a relatively weak starting position, the UK now leads on many indicators of commercialization activity. When viewed at the national level, the policy interventions of the past decade have helped transform the performance of UK universities. Evidence suggests the UK's position is much stronger than in the recent past and is still showing improvement. But national data masks the very large variation in the performance of individual universities. The evidence shows that a large number of universities have fallen off the back of the pack, a few perform strongly and the rest chase the leaders. This type of uneven distribution is not peculiar to the UK and is mirrored across other economies. In the UK, research is concentrated: less than 25% of universities receive 75% of the research funding. These same universities are also the institutions producing the greatest share of PhD graduates, science citations, patents and license income. The effect of policies generating long-term resource concentration has also created a distinctive set of universities which are research-led and commercially active. It seems clear that the concentration of research and commercialization work creates differences between universities. 共 13 页 第 2 页 The core objective for universities which are research-led must be to maximize the impact of their research efforts. These universities should be generating the widest range of social, economic and environmental benefits. In return for the scale of investment, they should share their expertise in order to build greater confidence in the sector. Part of the economic recovery of the UK will be driven by the next generation of research commercialization spilling out of our universities. There are three dozen universities in the UK which are actively engaged in advanced research training and commercialization work. If there was a greater coordination of technology transfer offices within regions and a simultaneous investment in the scale and functions of our graduate schools, universities could, and should, play a key role in positioning the UK for the next growth cycle. 1. What does the author think of UK universities in terms of commercialization? A) They fail to convert knowledge into money. B) They do not regard it as their responsibility. C) They still have a place among the world leaders. D) They have lost their leading position in many ways. 2. What does the author say about the national data on UK universities' performance in commercialization? A) It masks the fatal weaknesses of government policy. B) It does not rank UK universities in a scientific way. C) It does not reflect the differences among universities. D) It indicates their ineffective use of government resources. 3. We can infer from Paragraph 5 that “policy interventions“ (Line 1, Para. 4) refers to _. A) government aid to non-research-oriented universities B) compulsory cooperation between universities and industries C) fair distribution of funding for universities and research institutions D) concentration of resources in a limited number of universities 4. What does the author suggest research-led universities do? A) Publicize their research to win international recognition. B) Fully utilize their research to benefit all sectors of society. C) Generously share their facilities with those short of funds. D) Spread their influence among top research institutions. 5. How can the university sector play a key role in the UK's economic growth? A) By establishing more regional technology transfer offices. B) By asking the government to invest in technology transfer research. 共 13 页 第 3 页 C) By promoting technology transfer and graduate school education. D) By increasing the efficiency of technology transfer agencies. Passage Two Questions 6 to 10 are based on the following passage. Most office workers assume that the messages they send to each other via electronic mail are as private as a telephone call or a face-to-face meeting. That assumption is wrong. Although it is illegal in many areas for an employer to eavesdrop on private conversations or telephone callseven if they take place on a company-owned telephonethere are no clear rules governing electronic mail. In fact, the question of how private electronic mail transmissions should be has emerged as one of the more complicated legal issues of the electronic age. Peoples opinions about the degree of privacy that electronic mail should have vary depending on whose electronic mail system is being used and who is reading the messages. Does a government office, for example, have the right to destroy electronic messages created in the course of running the government, thereby denying public access to such documents? Some hold that government offices should issue guidelines that allow their staff to delete such electronic records, and defend this practice by claiming that the messages thus deleted already exist in paper versions whose destruction is forbidden. Opponents of such practices argue that the paper versions often omit such information as who received the messages and when they received them, information commonly carried on electronic mail systems. Government officials, opponents maintain, are civil servants; the public should thus have the right to review any documents created during the conducting of government business. Questions about electronic mail privacy have also arisen in the private sector. Recently, two employees of an automotive company were discovered to have been communicating disparaging information about their supervisor via electronic mail. The supervisor, who had been monitoring the communication, threatened to fire the employees. When the employees filed a grievance complaining that their privacy had been violated, they were let go. Later, their court case for unlawful termination was dismissed; the companys lawyers successfully argued that because the company owned the computer system, its supervisors had the right to read anything created on it. In some areas, laws prohibit outside interception of electronic mail by a third party without proper authorization such as a search warrant. However, these laws do not cover “inside” interception such as occurred at the automotive company. In the past, courts have ruled that interoffice communications may be considered private only if employees have a “reasonable expectation” of privacy when they send the messages. The fact is that no absolute guarantee of privacy exists in any computer system. The only solution may be for users to scramble their own messages with encryption codes; unfortunately, such complex codes are likely to undermine the principal virtue of electronic mail: its convenience. 6. Which one of the following statements most accurately summarizes the main point of the passage? 共 13 页 第 4 页 A) Until the legal questions surrounding the privacy of electronic mail in both the public and private sectors have been resolved, office workers will need to scramble their electronic mail messages with encryption codes. B) The legal questions surrounding the privacy of electronic mail in the work place can best be resolved by treating such communications as if they were as private as telephone conversations or face-to-face meetings. C) Any attempt to resolve the legal questions surrounding the privacy of electronic mail in the workplace must take into account the essential difference between public-sector and private sector business. D) At present, in both the public and private sectors, there seem to be no clear general answers to the legal questions surrounding the privacy of electronic mail in the workplace. 7. According to the passage, which one of the following best expresses the reason some people use to oppose the deletion of electronic mail records at government offices? A) Such deletion reveals the extent of governments unhealthy obsession with secrecy. B) Such deletion runs counter to the notion of governments accountability(责任) to its constituency (选民,支持者 ). C) Such deletion clearly violates the legal requirement that government offices keep duplicate copies of all their transactions. D) Such deletion violates the governments own guidelines against destruction of electronic records. 8. Which one of the following most accurately states the organization of the passage? A) A problem is introduced, followed by specific examples illustrating the problem: a possible solution is suggested, followed by an acknowledgment of its shortcomings. B) A problem is introduced, followed by explications of two possible solutions to the problem: the first solution is preferred to the second, and reasons are given for why it is the better alternative. C) A problem is introduced, followed by analysis of the historical circumstances that helped bring the problem about, and a possible solution is offered and rejected as being only a partial remedy. D) A problem is introduced, followed by enumeration of various questions that need to be answered before a solution can be found: one possible solution is proposed and argued for. 9. There are four opinions about an encryption system that could encode and decode electronic mail messages with a single keystroke. Which one would the author most likely hold? A) It would be an unreasonable burden on a companys ability to monitor electronic mail created by its employees. B) It would significantly reduce the difficulty of attempting to safeguard the privacy of electronic mail. 共 13 页 第 5 页 C) It would create substantial legal complications for companies trying to prevent employees from revealing trade secrets to competitors. D) It would guarantee only a minimal level of employee privacy, and so would not be worth the cost involved in installing such a system. 10. Given the information in the passage, which one of the following hypothetical events is LEAST likely to occur? A) A court rules that a government offices practice of deleting its electronic mail is not in the publics best interests. B) A private-sector employer is found liable for eavesdropping an office telephone conversation in which two employees exchanged disparaging information about their supervisor. C) A court upholds the right of a government office to destroy both paper and electronic versions of its in-house documents. D) A court upholds a private-sector employers right to monitor messages sent between employees over the companys in-house electronic mail system. Passage Three Questions 11 to 15 are based on the following passage. Computers have been taught to play not only checkers, but also championship chess, which is a fairly accurate yardstick for measuring the computers progress in the ability to learn from experience. Because the game requires logical reasoning, chess would seem to be perfectly suited to the computer .all a programmer has to do is give the computer a program evaluating the consequences of every possible response to every possible move, and the computer will win every time. In theory this is a sensible approach; in practice it is impossible. Today, a powerful computer can analyze 40 000 moves a second. That is an impressive speed, but there are an astronomical number of possible moves in chessliterally trillions. Even if such a program were written, there is no computer capable of holding that much data. Therefore, if the computer is to compete at championship levels, it must be programmed to function with less than complete data. It must be able to learn from experience, to modify its own program, to deal with a relatively unstructured situation in a word, to “think” for itself . In fact, this can be done. Chess-playing computers have yet to defeat world champion chess players, but several have beaten human players of only slightly lower ranks. The computers have had programs to carry them through the early, mechanical stages of their chess games. But they have gone on from there to reason and learn, and sometimes to win the game. There are other proofs that computers can be programmed to learn, but this example is sufficient to demonstrate the point. Granted, winning a game of chess is not an earthshaking event even when a computer does it. But there are many serious human problems which can be fruitfully approached as games. The Defense Department uses computers to play war games and work out 共 13 页 第 6 页 strategies for dealing with international tensions. Other problemsinternational and interpersonal relations , ecology and economics , and the ever-increasing threat of world faminecan perhaps be solved by the joint efforts of human beings and truly intelligent computers . 11. The purpose of creating chess-playing computers is _ A) to win the world chess champion B) to pave the way for further intelligent computers C) to work out strategies for international wars D) to find an accurate yardstick for measuring computer progress 12. Today, a chess-playing computer can be programmed to _ A ) give trillions of responses in a second to each possible move and win the game B) function with complete data and beat the best players C) learn from chess-playing in the early stage and go on to win the game D) evaluate every possible move but may fail to give the right response each time 13. For a computer to “ think” , it is necessary to _ A) mange to process as much data as possible in a second B) program it so that it can learn from its experiences C) prepare it for chess-playing first D) enable it to deal with unstructured situations 14. The authors attitude towards the Defense Department is_ A) critical B) unconcerned C) positive D) negative 15. In the authors opinion,_ A) winning a chess game is an unimportant event B) serious human problems shouldnt be regarded as playing a

    注意事项

    本文(2016年电子科技大学244 英语考研真题.pdf)为本站会员(小小鹿)主动上传,考研文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知考研文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    1111
    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2018 kaoyanwenku.com网站版权所有
    经营许可证编号:鄂ICP备20009915号-2

    x