1、科目代码:246 科目名称:英语 第 1 页 共 7 页 南京航空航天大学南京航空航天大学2015 年硕士研究生入学考试初试试题( A 卷 ) 2015 年硕士研究生入学考试初试试题( A 卷 ) 科目代码: 246 科目名称: 英语 满分: 100 分 注意: 认真阅读答题纸上的注意事项;所有答案必须写在答题纸上,写在本试题纸或草稿纸上均无 认真阅读答题纸上的注意事项;所有答案必须写在答题纸上,写在本试题纸或草稿纸上均无效;本试题纸须随答题纸一起装入试题袋中交回!效;本试题纸须随答题纸一起装入试题袋中交回!I. Vocabulary and Structure (20 points) Dir
2、ections: There are 20 incomplete sentences in this part. For each sentence there are four choices marked A., B., C. and D. Choose the ONE answer that best completes the sentence. Then write down your answer on the Answer Sheet. 1. Why didnt you buy it ?” “I _ but I didnt have the money.” A. would B.
3、 would have C. had had D. had bought 2. The board deemed it urgent that these files _ right away. A. had to be printed B. should have been printed C. must be printed D. should be printed 3. I have heard both colleagues and boss _ well of him. A. to speak B. spoken C. to have spoken D. speak 4. Jean
4、worked just so much _. A. like what she was told to B. as she was told to C. as to what she tried to do D. like she was told to 5. This union, _ the 1990s, provides financial assistance to support laid-off workers. A. when it was founded B. was founded C. which was founded in D. was founded in 6. Hu
5、man behavior is mostly a product of learning, _ the behavior of animal depends mainly on instinct. A. so B. unless C. however D. whereas 7. He _ the meeting, but upon learning that they would discuss something irrelevant to his field of study, he dropped the idea. A. were going to attend B. had atte
6、nded C. were to attend D. would have attended 8. The computer is the only one _ to issue tickets on the plane. A. to allow B. allowed C. allowing D. to have allowed 9. So confused _ that he didnt know how to start his lecture. A. since he became B. that he became C. would he become D. did he become
7、10. Nuclear science should be developed to benefit people _ harm them. A. more than B. rather than C. other than D. better than 11. John said that he was going to _ his wife home next year. A. advise B. accompany C. depart D. discard 12. Prices _ because of the change in economic policy. A. flew B.
8、skipped C. ran D. soared 13. If full credit were given to this part, it could _ a high grade for the student in his physical course. A. belong to B. be due to C. subject to D. contribute to 14. The teacher wrote a brief comment in the _ to show the student why it is wrong. A. mark B. margin C. mail
9、D. manual 科目代码:246 科目名称:英语 第 2 页 共 7 页 15. The response to our financial appeal _ anything we expected. A. impressed B. surprised C. surpassed D. passed 16. Every autumn the bears can be seen _ around this town of about 800 people. A. wondering B. wandering C. winding D. wounding 17. The population
10、bomb is a _ that has already happened in some parts of the world, with terrible results. A. distress B. miracle C. disaster D. giant 18. It is well admitted that the high _ rate is caused in part by failure to communicate. A. unemployment B. birth C. divorce D. inflation 19. The educational plan wil
11、l fail because it has no _. A. vacation B. version C. vision D. variation 20Mark offered to help me to learn English _. A. on duty B. in vain C. on purpose D. in earnest II. Cloze (20 points) Directions: There are 20 blanks in the following passage. For each blank there are four choices marked A, B,
12、 C and D. You should choose the ONE that best fits into the passage. Then write down your answer on the Answer Sheet. The United States has been working hard to _21_ Japan to make a momentous decision. _22_ Japan agrees, generations to come will curse _23_ day. _24_ the United States wants is for Ja
13、pan to free its _25_ forces for service overseas. _26_ recently, the Japanese government was being _27_ by Washington to send their troops to Persian Gulf. _28_ Tokyo said no, never. Then it said no, never,_29_. If Japanese soldiers go overseas to _30_ the Persian Gulf forces or perhaps _31_ some fu
14、ture U.N. peace-keeping mission, then we will have _32_: the nightmare of the Japanese and hundreds of other Asians come _33_. In violation of its _34_, Japans armed forces _35_ no longer be _36_ up in a military closet _37_ the key in civilian hands. Count _38_ this : the Japanese army will again b
15、ecome a political force at home, a _39_ threat to the delicate civilian equilibrium _40_ now protects Japans democratic society. 21. A. persuade B. order C. want D. hope 22. A. Because B. Since C. If D. Until 23. A. that B. a C. the D. any 24. A. Whether B. How C. When D. What 25. A. armed B. army C
16、. arm D. arms 26.A. Least B. Only C. Little D. Most 27. A. put B. pushed C. placed D. stationed 28. A. And B. Now C. Or D. First 29. A. something B. maybe C. however D. really 30. A fight B. help C. send D. join 31. A. in B. to C. on D. for 32. A. below B.it C. them D. these 33. A. alive B. active C
17、. along D. astir 34. A. government B. article C. report D. constitution 35. A. must B. will C. shall D. ought to 科目代码:246 科目名称:英语 第 3 页 共 7 页 36. A. looked B. woken C. dreamed D. locked 37. A. with B. but C. by D. having 38. A. down B. off C. on D. up 39. A. military B. war C. constant D. social 40.
18、 A. but B. up to C. that D. just III. Reading Comprehension (30 points) Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice and write
19、down your answer on the Answer Sheet. Passage 1 A variety of simple techniques can prevent computer crime, but more sophisticated methods are also necessary to prevent computer crimes. One technique to protect confidentiality is encryption(加密) . Information can be scrambled and unscrambled using mat
20、hematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by
21、several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge. Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control software verifies co
22、mputer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding sec
23、urity clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. Tokens are tamper-resist
24、ant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the tokens password, as well as another password entered by the user, and matches these two to an identical token passwo
25、rd generated by the computer and the users password, which is stored on a confidential list. In the future, passwords and tokens may be reinforced by biometrics (生物测定学), identification methods that use unique personal characteristics, such as fingerprints, skin oils, voice variations, and keyboard-t
26、yping rhythms. Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining acces
27、s to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computers functions. 41.Which of the following statements best expresses the main idea of the passage? A. There
28、 are many techniques used to prevent computer crime. B. People are eager to commit computer crime. 科目代码:246 科目名称:英语 第 4 页 共 7 页 C. Encryption is a useful technique to protect confidentiality. D. Password can prevent computer crime. 42. According to Paragraph 2, the keys are changed frequently in ord
29、er to _. A. encode more data B. decode more data C. give people more private keys D. make information difficult to decode 43. Which of the following passwords does not belong to biometrics? A. Numbers B. Fingerprints C. Skin oils D. Voice variations 44. “Vulnerable” in the last paragraph is closest
30、in meaning to “_”. A. susceptible B. changeable C. valuable D. dependable 45.According to this passage, “firewall” refers to “ _”. A. network functions B. access to information on a network C. a piece of device that protects the computers from being invaded or destroyed D. computer virus that can co
31、py computer programs Passage 2 Many private institutions of higher education around the country are in danger. Not all will be saved, and perhaps not all deserve to be saved. There are low-quality schools just as there are low-quality businesses. We have no obligation to save them simply because the
32、y exist. But many thriving institutions that deserve to continue are threatened. They are doing a fine job educationally, but they are caught in a financial difficulty, with no way to reduce rising costs or increase revenues significantly. Raising tuition doesnt bring in more revenue, for each time
33、tuition goes up, the enrollment goes down, or the amount that must be given away in student aid goes up. Schools are bad businesses, whether public or private, not usually because of bad management but because of the nature of the enterprise. They lose money on every customer, and they can go bankru
34、pt either from too few students or too many students. Even a very good college is a very bad business. It is such colleges, thriving but threatened, that I worry about. Low enrollment is not their chief problem. Even with full enrollments, they may go under. Efforts to save them, and preferably to k
35、eep them private, are a national necessity. There is no basis for arguing that private schools are bound to be better than public schools. There are abundant examples to the contrary. Anyone can name state universities and colleges that rank as the finest in the nation and the world. It is now inevi
36、table that public institutions will be dominant, and therefore diversity is a national necessity. Diversity in the way we support schools tends to give us a healthy diversity in the forms of education. In an imperfect society such as ours, uniformity of education throughout the nation could be dange
37、rous. In an imperfect society, diversity is a positive good. Eager supporters of public higher education know the importance of sustaining private higher education. 46.In the passage, the author appeals to the public to support_. A. private higher education in general B. public higher education in g
38、eneral C. high-quality private universities and colleges D. high-quality state universities and colleges 科目代码:246 科目名称:英语 第 5 页 共 7 页 47. According to the passage, schools are bad businesses because of _. A. the nature of school B. poor teachers C. bad management D. too few students 48. What does th
39、e phrase “go under (Par. 2, sentence 3) probably mean? A. Have low tuition B. Get into difficulties C. Do a bad job educationally D. Have high tuition 49. Which of the following statements is true? A. There are many cases to indicate that private schools are superior to public schools. B. The author
40、 thinks diversity of education is preferable to uniformity of education. C. A high-quality university is always a good business. D. Each time tuition is raised, the enrollment goes up. 50.In the authors opinion, the way that can save private schools lies in _. A. full enrollment B. raised tuition C.
41、 reducing student aid D. national support Passage 3 It started last year when a group of middle school children on a biology field trip in south-central Minnesota spotted some unusual-looking frogs. One was missing a leg, some had withered arms, others had shrunken eyes. Of the 22 frogs caught that
42、day, 11 were deformed. Their teacher told officials. Reports of strange frogs began to mount: a frog with nine legs; a clubfooted frog; a frog with three eyes, one of them in its throat. At first, investigators from the Minnesota Pollution Control Agency in St. Paul assumed that the problem was rest
43、ricted to their state, and the agricultural part at that. They were wrong. Deformed frogs have since turned up in Wisconsin, South Dakota, Vermont and up into Canada. “Abnormalities like this get me worried,” says David Hoppe, a University of Minnesota researcher. “We dont know how far this is going
44、 to go.” Because frogs spend much of their life in water, pesticides or harmful metals were prime suspects. But now possible causes include acid rain, global warming and increased ultraviolet light. Hoppe observes that different deformities seem to be concentrated in frogs from different regions. It
45、 may be, he says, that more than one cause is at work. What some scientists fear is that the frogs could be a sign that something is very wrong with the environment. “We may have a large problem here,” says Robert McKinnell, a University of Minnesota cancer researcher, who has collected hundreds of
46、deformed frogs. “If frogs are not able to handle whatever it is that is causing this, it may turn out that people cant either.” 51.What is the meaning of the word “deformed” in the first paragraph? A. Without form B. Form spoiled C. Form changed D. Formed again 52. The following are the possible cau
47、ses of strange frogs EXCEPT _. A. acid rain B. increased population C. global warming D. harmful metals 53. Which of the following statements is true according to the passage? A. Different deformities seem to be concentrated in frogs from different regions. B. Investigators declared that the problem
48、 of frogs was restricted to Minnesota. 科目代码:246 科目名称:英语 第 6 页 共 7 页 C. Unusual frogs were first discovered by researchers is Pollution Control Agency. D.Scientists fear that these frogs could be a sign of something wrong with frogs of past generation. 54. The following words appearing in the passage
49、 have similar meanings EXCEPT _. A. unusual B. strange C. different D. wrong 55.Robert McKinnells remarks imply that _. A. people cannot solve this problem since frogs cannot B. people do not have such a problem even if frogs have C. the reason for strange frogs is unknown D. there is a large proble
50、m with environment Passage 4 It was September of 1620 when their ship, called the “Mayflower” left port with 102 men, women and children on board. This was the worst season of the year for an ocean crossing, and the trip was very uneven. After sixty-five days at sea, she landed in Provincetown Harbo