ImageVerifierCode 换一换
格式:PDF , 页数:11 ,大小:63.55KB ,
文档编号:3555239      下载积分:16 文币
快捷下载
登录下载
邮箱/手机:
温馨提示:
系统将以此处填写的邮箱或者手机号生成账号和密码,方便再次下载。 如填写123,账号和密码都是123。
支付方式: 支付宝    微信支付   
验证码:   换一换

优惠套餐
 

温馨提示:若手机下载失败,请复制以下地址【https://www.163wenku.com/d-3555239.html】到电脑浏览器->登陆(账号密码均为手机号或邮箱;不要扫码登陆)->重新下载(不再收费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  
下载须知

1: 试题类文档的标题没说有答案,则无答案;主观题也可能无答案。PPT的音视频可能无法播放。 请谨慎下单,一旦售出,概不退换。
2: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
3: 本文为用户(雁南飞1234)主动上传,所有收益归该用户。163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

1,本文(2015年电子科技大学考研专业课试题翻译硕士英语.pdf)为本站会员(雁南飞1234)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!

2015年电子科技大学考研专业课试题翻译硕士英语.pdf

1、共 11 页 第 1 页 电子科技大学电子科技大学 2015 年攻读硕士学位研究生入学考试试题年攻读硕士学位研究生入学考试试题 考试科目:考试科目:211 翻译硕士英语翻译硕士英语 注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。Part I Grammar&Vocabulary(1x30=30 points)There are thirty sentences in this section.Beneath each sentence there are four words or phrases marke

2、d A),B),C)and D).Please choose the correct answer that best completes the sentence and mark your answers on the ANSWER SHEET.1.To check that your mobile phone is _with the products we sell,click on the link below that matches the manufacturer of your mobile phone.A)confidential B)compatible C)consci

3、entious D)conspicuous 2.26%votes said they had a moment of silence or prayer to _ the anniversary of Sept.11.A)commemorate B)manipulate C)withhold D)consensus 3.The English weather defies forecast and hence is a source of interest and _ to everyone.A)speculation B)attribution C)utilization D)proposi

4、tion 4.He is eager to get the information about when copyrights for computer authors or in visual arts _.A)abolish B)constrain C)amend D)expire 5.For the time being there are more _ to be filled in the companies,but they are far from enough to meet the demands of so many graduates.A)vacations B)vari

5、eties C)vacancies D)variations 6.Apart from caring for her children,she has to take on such heavy _ housework as carrying water and firewood.A)time-consumed B)timely-consumed C)time-consuming D)timely-consuming 共 11 页 第 2 页 7.When you worry you cant sleep and when you cant sleep you worry even more.

6、Its a _ circle.A)bad B)repetitive C)round D)vicious 8.Their products are frequently overpriced and _ in quality.A)influential B)inferior C)superior D)subordinate 9.Even as a child Thomas Edison had very _ mind;at the age of three he performed his first experiment.A)intricate B)indignant C)incidental

7、 D)inquisitive 10.The current political _ of our country is favourable for foreign investments.A)climate B)temperature C)weather D)state 11.The purpose of the survey was to _ the inspectors with local conditions.A)inform B)notify C)instruct D)acquaint 12.The motorist had to _ to avoid knocking the o

8、ld woman down in the middle of the road.A)swerve B)twist C)depart D)swing 13.Xiao Yan was somewhat short-sighted;she had the habit of _ at people.A)glancing B)peering C)gazing D)scanning 14.Even though the evidence is so overwhelming,if one juror is still _,the case must be retried.A)present B)surpr

9、ised C)skeptical D)hungry 15.The contents of the box must _ to the description on the label.A)yield B)appeal C)correspond D)relate 16.I have no objection _ your story again.A)to hear B)to hearing C)to having heard D)to have heard 共 11 页 第 3 页 17.You will see this product _ wherever you go.A)to be ad

10、vertised B)advertised C)advertise D)advertising 18.Such crimes may be so complex that months or years go by before anyone _ them.A)discovered B)will discover C)would have discovered D)discovers 19.While crossing the mountain area,all the men carried guns lest they _ by wild animals.A)should be attac

11、ked B)had been attacked C)must be attacked D)would be attacked 20.It was not until it was getting dark _ the child remembered to go back home.A)when B)had C)that D)then 21.The newly developing science of artificial intelligence aims at programming the computer to think,reason and react _ people do.A

12、)by the same way as B)in much the same way that C)with the same way as D)as much as the same way that 22.The residents _ had been damaged by the fire were given help by the Red Cross.A)all of their homes B)all their homes C)whose all homes D)all of whose homes 23.Contrast may make something appear m

13、ore beautiful than it is when _ alone.A)seen B)is seen C)to be seen D)having been seen 24.Sometimes children have trouble _ fact from fiction and may believe that such things actually exist.A)to separate B)separating C)for separating D)of separating 25.Things might have been much worse if the mother

14、 _ on her right to keep the baby.A)has been insisting B)had insisted C)would insist D)insisted 26.Many a delegate was in favor of his proposal that a special committee _ to investigate the incident.A)were set up B)was set up C)be set up D)set up 共 11 页 第 4 页 27._ the increase in air fares,most peopl

15、e still prefer to travel by plane.A)No matter how B)Regardless C)Though D)Despite 28.I don t think it is funny,but my friend _.A)cannot help to laugh B)cannot help laugh C)cannot but laughing D)cannot help but laugh 29._,Chinas large and medium-sized state enterprises need to improve their managemen

16、t right now.A)As it should be B)As it must be C)As it is D)As it were 30.The budget they made is unrealistic _ it disregards increased costs.A)for that B)for which C)in that D)in which Part II Reading Comprehension(1.5x20+1x10=40 Points)In this section there are five reading passages followed by a t

17、otal of 20 multiple-choice questions and 5 short answer questions.Please read the passages and then write your answers on the ANSWER SHEET.TEXT A Design of all the new tools and implements is based on careful experiments with electronic instruments.First,a human“guinea pig”is tested using a regular

18、tool.Measurements are taken of the amount of work done,and the buildup of heat in the body.Twisted joints and stretched muscles can not perform as well,it has been found,as joints and muscles in their normal positions.The same person is then tested again,using a tool designed according to the sugges

19、tions made by Dr.Tichauer.All these tests have shown the great improvement of the new designs over the old.One of the electronic instruments used by Dr.Tichauer,the myograph,makes visible through electrical signals the work done by human muscle.Another machine measures any dangerous features of tool

20、s,thus proving information upon which to base a new design.One conclusion of tests made with this machine is that a tripod stepladder is more stable and safer to use than one with four legs.This work has attracted the attention of efficiency experts and time-and-motion-study engineers,but its value

21、goes far beyond that.Dr.Tichauers first thought is for the health of the tool user.With the repeated use of the same tool all day long on production lines and in other jobs,even light manual work can put a heavy stress on one small area of the body.In time,such stress can 共 11 页 第 5 页 cause a disabl

22、ing disease.Furthermore,muscle fatigue is a serious safety hazard.Efficiency is the by-product of comfort,Dr.Tichauer believes,and his new designs for traditional tools have proved his point.31.What are involved in the design of a new tool according to the passage?A)Electronic instruments and a regu

23、lar tool.B)A human“guinea pig”and a regular tool.C)Electronic instruments and a human“guinea pig”.D)Electronic instruments,a human“guinea pig”and a regular tool.32.From the passage we know that joints and muscles perform best when _.A)they are twisted and stretched B)they are in their normal positio

24、ns C)they are tested with a human“guinea pig”D)they are tested with electronic instruments 33.A“myograph”(Para.2,Line 1)is an electronic instrument that _.A)is able to design new tools B)measures the amount of energy used C)enable people to see the muscular movement D)visualizes electrical signals 3

25、4.It can be inferred from the passage that _.A)a stepladder used to have four legs.B)it is dangerous to use tools C)a tripod is safer in a tool design D)workers are safer on production lines 35.Dr.Tichauer started his experiments initially to _.A)improve efficiency B)increase production C)reduce wor

26、k load D)improve comfort TEXT B More and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his own purposes can reap big reward.Even worse,a number o

27、f people who have done this and been caught at it have managed to get away without punishment.Its easy for computer crimes to go undetected if no one checks up on what the computer is 共 11 页 第 6 页 doing.But even if the crime is detected,the criminal may walk away not only unpunished but with a glowi

28、ng recommendation from his former employers.Of course,we have no statistics on crimes that go undetected.But its disturbing to note how many of the crimes we do know about were detected by accident,not by systematic inspections or other security procedures.The computer criminals who have been caught

29、 may have been the victims of uncommonly bad luck.Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment,demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too

30、 often,their demands have been met.Why?Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right und

31、er the noses of the companys executives,accountants,and security staff.And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.36.It can be concluded from the passage that _.A)it is still impossible to detect computer crimes today B)people com

32、mit computer crimes at the request of their company C)computer criminals escape punishment because they cant be detected D)computer crimes are the most serious problem in the operation of financial institutions 37.It is implied in the third paragraph that _.A)most computer criminals who are caught b

33、lame their bad luck B)the rapid increase of computer crimes is a troublesome problem C)most computer criminals are smart enough to cover up their crimes D)many more computer crimes go undetected that are discovered 38.Which of the following statements is mentioned in the passage?A)A strict law again

34、st computer crimes must be enforced B)Companies usually hesitate to uncover computer crimes to protect their reputation C)Companies will guard against computer crimes to protect their reputation D)Companies need to impose restrictions on confidential information 39.What may happen to computer crimin

35、als once they are caught?A)With a bad reputation they can hardly find another job.B)They may walk away and easily find another job.C)They will be denied access to confidential records D)They must leave the country to go to jail.共 11 页 第 7 页 40.The passage is mainly about _.A)why computer criminals a

36、re often able to escape punishment B)why computer crimes are difficult to detect by systematic inspections C)how computer criminals mange to get good recommendations from their former employers D)why computer crimes cant be eliminated TEXT C It is 3 A.M.Everything on the university campus seems ghos

37、tlike in the quiet,misty darknesseverything except the computer center.Here,twenty students rumpled and bleary-eyed,sit transfixed at their consoles,tapping away on the terminal keys.With eyes glued to the video screen,they tap on for hours.For the rest of the world,it might be the middle of the nig

38、ht,but here time does not exist.This is a world unto itself.These young computer hackers are pursuing a kind of compulsion;a drive so consuming it overshadows nearly every other part of their lives and forms the focal point of their existence.They are compulsive computer programmers.Some of these st

39、udents have been at the console for thirty hours or more without a break for meals or sleep.Some have fallen asleep on sofas and lounge chairs in the computer center,trying to catch a few winks but loathe getting too far away from their beloved machines.Most of these students dont have to be at the

40、computer center in the middle of the night.They arent working on assignments.They are there because they want to be-they are irresistibly drawn there.And they are not alone.There are hackers at computer centers all across the country.In their extreme form,they focus on nothing else.They flunk out of

41、 school and lose contact with friends;they might have difficulty finding jobs,choosing instead to wander from one computer center to another.They may even forgo personal hygiene.I remember one hacker.We literally had to carry him off his chair to feed him and put him to sleep.We really feared for hi

42、s health,says a computer science professor at MIT.Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction that are already severe.They know that the case of the hackers is not just the sto

43、ry of one persons relationship with a machine.It is the story of a societys relationship to the so-called thinking machines,which are becoming almost everywhere.41.We can learn from the passage that those at the computer center in the middle of the night are_.A)students working on a program B)studen

44、ts using computers to amuse themselves C)hard-working computer science majors D)students deeply fascinated by the computer 42.Which of the following is NOT true of those young computer hackers?A)Most of them are top students majoring in computer programming.共 11 页 第 8 页 B)For them,computer programmi

45、ng is the sole purpose for their life.C)They can stay with the computer at the center for nearly three days on end.D)Their love for the computer is so deep that they want to be near their machines even when they sleep.43.It can be reasonably inferred from the passage that _.A)the hacker phenomenon e

46、xists only at university computer centers B)university computer centers are open to almost everyone C)university computer centers are expecting outstanding programmers out of the hackers D)the hacker phenomenon is partly attributable to the deficiency of the computer centers 44.The authors attitude

47、towards the hacker phenomenon can be described as _.A)affirmative B)contemptuous C)anxious D)disgusted 45.Which of the following may be a most appropriate title for the passage?A)The Charm of Computer Science B)A New Type of Electronic Toys C)Compulsive Computer Programmers D)Computer Addicts TEXT D

48、 Public officials and candidates for public office routinely use public opinion polls to keep track of what the people are thinking.An important question is the degree to which these polls should guide leaders in their actions.There are arguments for and against the use of polls as the basis for pol

49、icy decisions.Polls can contribute to effective government by keeping political leaders from getting too far out of line with the publics thinking.In a democratic society,the effectiveness of a public policy often depends on the extent of its public support.When a policy is contrary to the publics d

50、esires,people may choose to disregard or undermine it,thus making it counterproductive or inefficient.Further,when government pursues a course of action with which a large proportion of the public disagrees,it risks a loss of public confidence,which can have a negative effect on its ability to lead.

侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|