2015南京航空航天大学246英语真题.pdf

返回 相关 举报
2015南京航空航天大学246英语真题.pdf_第1页
第1页 / 共7页
亲,该文档总共7页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
S “ S “ : :2t bt?v M V 3 I k k k5 “ S “ S “ s si s5 i Y sAs5 k5 (r k5 s5B k5 I. Vocabulary and Structure (20 points) Directions: There are 20 incomplete sentences in this part. For each sentence there are four choices marked A., B., C. and D. Choose the ONE answer that best completes the sentence. Then write down your answer on the Answer Sheet. 1. Why didnt you buy it ?” “I _ but I didnt have the money.” A. would B. would have C. had had D. had bought 2. The board deemed it urgent that these files _ right away. A. had to be printed B. should have been printed C. must be printed D. should be printed 3. I have heard both colleagues and boss _ well of him. A. to speak B. spoken C. to have spoken D. speak 4. Jean worked just so much _. A. like what she was told to B. as she was told to C. as to what she tried to do D. like she was told to 5. This union, _ the 1990s, provides financial assistance to support laid-off workers. A. when it was founded B. was founded C. which was founded in D. was founded in 6. Human behavior is mostly a product of learning, _ the behavior of animal depends mainly on instinct. A. so B. unless C. however D. whereas 7. He _ the meeting, but upon learning that they would discuss something irrelevant to his field of study, he dropped the idea. A. were going to attend B. had attended C. were to attend D. would have attended 8. The computer is the only one _ to issue tickets on the plane. A. to allow B. allowed C. allowing D. to have allowed 9. So confused _ that he didnt know how to start his lecture. A. since he became B. that he became C. would he become D. did he become 10. Nuclear science should be developed to benefit people _ harm them. A. more than B. rather than C. other than D. better than 11. John said that he was going to _ his wife home next year. A. advise B. accompany C. depart D. discard 12. Prices _ because of the change in economic policy. A. flew B. skipped C. ran D. soared 13. If full credit were given to this part, it could _ a high grade for the student in his physical course. A. belong to B. be due to C. subject to D. contribute to 14. The teacher wrote a brief comment in the _ to show the student why it is wrong. A. mark B. margin C. mail D. manual S “ S “ : :15. The response to our financial appeal _ anything we expected. A. impressed B. surprised C. surpassed D. passed 16. Every autumn the bears can be seen _ around this town of about 800 people. A. wondering B. wandering C. winding D. wounding 17. The population bomb is a _ that has already happened in some parts of the world, with terrible results. A. distress B. miracle C. disaster D. giant 18. It is well admitted that the high _ rate is caused in part by failure to communicate. A. unemployment B. birth C. divorce D. inflation 19. The educational plan will fail because it has no _. A. vacation B. version C. vision D. variation 20Mark offered to help me to learn English _. A. on duty B. in vain C. on purpose D. in earnest II. Cloze (20 points) Directions: There are 20 blanks in the following passage. For each blank there are four choices marked A, B, C and D. You should choose the ONE that best fits into the passage. Then write down your answer on the Answer Sheet. The United States has been working hard to _21_ Japan to make a momentous decision. _22_ Japan agrees, generations to come will curse _23_ day. _24_ the United States wants is for Japan to free its _25_ forces for service overseas. _26_ recently, the Japanese government was being _27_ by Washington to send their troops to Persian Gulf. _28_ Tokyo said no, never. Then it said no, never,_29_. If Japanese soldiers go overseas to _30_ the Persian Gulf forces or perhaps _31_ some future U.N. peace-keeping mission, then we will have _32_: the nightmare of the Japanese and hundreds of other Asians come _33_. In violation of its _34_, Japans armed forces _35_ no longer be _36_ up in a military closet _37_ the key in civilian hands. Count _38_ this : the Japanese army will again become a political force at home, a _39_ threat to the delicate civilian equilibrium _40_ now protects Japans democratic society. 21. A. persuade B. order C. want D. hope 22. A. Because B. Since C. If D. Until 23. A. that B. a C. the D. any 24. A. Whether B. How C. When D. What 25. A. armed B. army C. arm D. arms 26.A. Least B. Only C. Little D. Most 27. A. put B. pushed C. placed D. stationed 28. A. And B. Now C. Or D. First 29. A. something B. maybe C. however D. really 30. A fight B. help C. send D. join 31. A. in B. to C. on D. for 32. A. below B.it C. them D. these 33. A. alive B. active C. along D. astir 34. A. government B. article C. report D. constitution 35. A. must B. will C. shall D. ought to S “ S “ : :36. A. looked B. woken C. dreamed D. locked 37. A. with B. but C. by D. having 38. A. down B. off C. on D. up 39. A. military B. war C. constant D. social 40. A. but B. up to C. that D. just III. Reading Comprehension (30 points) Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice and write down your answer on the Answer Sheet. Passage 1 A variety of simple techniques can prevent computer crime, but more sophisticated methods are also necessary to prevent computer crimes. One technique to protect confidentiality is encryption(F ) . Information can be scrambled and unscrambled using mathematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge. Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the tokens password, as well as another password entered by the user, and matches these two to an identical token password generated by the computer and the users password, which is stored on a confidential list. In the future, passwords and tokens may be reinforced by biometrics ( 3 ), identification methods that use unique personal characteristics, such as fingerprints, skin oils, voice variations, and keyboard-typing rhythms. Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computers functions. 41.Which of the following statements best expresses the main idea of the passage? A. There are many techniques used to prevent computer crime. B. People are eager to commit computer crime. S “ S “ : :C. Encryption is a useful technique to protect confidentiality. D. Password can prevent computer crime. 42. According to Paragraph 2, the keys are changed frequently in order to _. A. encode more data B. decode more data C. give people more private keys D. make information difficult to decode 43. Which of the following passwords does not belong to biometrics? A. Numbers B. Fingerprints C. Skin oils D. Voice variations 44. “Vulnerable” in the last paragraph is closest in meaning to “_”. A. susceptible B. changeable C. valuable D. dependable 45.According to this passage, “firewall” refers to “ _”. A. network functions B. access to information on a network C. a piece of device that protects the computers from being invaded or destroyed D. computer virus that can copy computer programs Passage 2 Many private institutions of higher education around the country are in danger. Not all will be saved, and perhaps not all deserve to be saved. There are low-quality schools just as there are low-quality businesses. We have no obligation to save them simply because they exist. But many thriving institutions that deserve to continue are threatened. They are doing a fine job educationally, but they are caught in a financial difficulty, with no way to reduce rising costs or increase revenues significantly. Raising tuition doesnt bring in more revenue, for each time tuition goes up, the enrollment goes down, or the amount that must be given away in student aid goes up. Schools are bad businesses, whether public or private, not usually because of bad management but because of the nature of the enterprise. They lose money on every customer, and they can go bankrupt either from too few students or too many students. Even a very good college is a very bad business. It is such colleges, thriving but threatened, that I worry about. Low enrollment is not their chief problem. Even with full enrollments, they may go under. Efforts to save them, and preferably to keep them private, are a national necessity. There is no basis for arguing that private schools are bound to be better than public schools. There are abundant examples to the contrary. Anyone can name state universities and colleges that rank as the finest in the nation and the world. It is now inevitable that public institutions will be dominant, and therefore diversity is a national necessity. Diversity in the way we support schools tends to give us a healthy diversity in the forms of education. In an imperfect society such as ours, uniformity of education throughout the nation could be dangerous. In an imperfect society, diversity is a positive good. Eager supporters of public higher education know the importance of sustaining private higher education. 46.In the passage, the author appeals to the public to support_. A. private higher education in general B. public higher education in general C. high-quality private universities and colleges D. high-quality state universities and colleges S “ S “ : :47. According to the passage, schools are bad businesses because of _. A. the nature of school B. poor teachers C. bad management D. too few students 48. What does the phrase “go under (Par. 2, sentence 3) probably mean? A. Have low tuition B. Get into difficulties C. Do a bad job educationally D. Have high tuition 49. Which of the following statements is true? A. There are many cases to indicate that private schools are superior to public schools. B. The author thinks diversity of education is preferable to uniformity of education. C. A high-quality university is always a good business. D. Each time tuition is raised, the enrollment goes up. 50.In the authors opinion, the way that can save private schools lies in _. A. full enrollment B. raised tuition C. reducing student aid D. national support Passage 3 It started last year when a group of middle school children on a biology field trip in south-central Minnesota spotted some unusual-looking frogs. One was missing a leg, some had withered arms, others had shrunken eyes. Of the 22 frogs caught that day, 11 were deformed. Their teacher told officials. Reports of strange frogs began to mount: a frog with nine legs; a clubfooted frog; a frog with three eyes, one of them in its throat. At first, investigators from the Minnesota Pollution Control Agency in St. Paul assumed that the problem was restricted to their state, and the agricultural part at that. They were wrong. Deformed frogs have since turned up in Wisconsin, South Dakota, Vermont and up into Canada. “Abnormalities like this get me worried,” says David Hoppe, a University of Minnesota researcher. “We dont know how far this is going to go.” Because frogs spend much of their life in water, pesticides or harmful metals were prime suspects. But now possible causes include acid rain, global warming and increased ultraviolet light. Hoppe observes that different deformities seem to be concentrated in frogs from different regions. It may be, he says, that more than one cause is at work. What some scientists fear is that the frogs could be a sign that something is very wrong with the environment. “We may have a large problem here,” says Robert McKinnell, a University of Minnesota cancer researcher, who has collected hundreds of deformed frogs. “If frogs are not able to handle whatever it is that is causing this, it may turn out that people cant either.” 51.What is the meaning of the word “deformed” in the first paragraph? A. Without form B. Form spoiled C. Form changed D. Formed again 52. The following are the possible causes of strange frogs EXCEPT _.
展开阅读全文
相关资源
相关搜索
资源标签

考研文库@kaoyanwenku.com