2015年南京航空航天大学考研专业课试题246二外英语.pdf

上传人(卖家):雁南飞1234 文档编号:2792606 上传时间:2022-05-26 格式:PDF 页数:7 大小:77.86KB
下载 相关 举报
2015年南京航空航天大学考研专业课试题246二外英语.pdf_第1页
第1页 / 共7页
亲,该文档总共7页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、科目代码:246 科目名称:英语 第 1 页 共 7 页 南京航空航天大学南京航空航天大学2015 年硕士研究生入学考试初试试题( A 卷 ) 2015 年硕士研究生入学考试初试试题( A 卷 ) 科目代码: 246 科目名称: 英语 满分: 100 分 注意: 认真阅读答题纸上的注意事项;所有答案必须写在答题纸上,写在本试题纸或草稿纸上均无 认真阅读答题纸上的注意事项;所有答案必须写在答题纸上,写在本试题纸或草稿纸上均无效;本试题纸须随答题纸一起装入试题袋中交回!效;本试题纸须随答题纸一起装入试题袋中交回!I. Vocabulary and Structure (20 points) Dir

2、ections: There are 20 incomplete sentences in this part. For each sentence there are four choices marked A., B., C. and D. Choose the ONE answer that best completes the sentence. Then write down your answer on the Answer Sheet. 1. Why didnt you buy it ?” “I _ but I didnt have the money.” A. would B.

3、 would have C. had had D. had bought 2. The board deemed it urgent that these files _ right away. A. had to be printed B. should have been printed C. must be printed D. should be printed 3. I have heard both colleagues and boss _ well of him. A. to speak B. spoken C. to have spoken D. speak 4. Jean

4、worked just so much _. A. like what she was told to B. as she was told to C. as to what she tried to do D. like she was told to 5. This union, _ the 1990s, provides financial assistance to support laid-off workers. A. when it was founded B. was founded C. which was founded in D. was founded in 6. Hu

5、man behavior is mostly a product of learning, _ the behavior of animal depends mainly on instinct. A. so B. unless C. however D. whereas 7. He _ the meeting, but upon learning that they would discuss something irrelevant to his field of study, he dropped the idea. A. were going to attend B. had atte

6、nded C. were to attend D. would have attended 8. The computer is the only one _ to issue tickets on the plane. A. to allow B. allowed C. allowing D. to have allowed 9. So confused _ that he didnt know how to start his lecture. A. since he became B. that he became C. would he become D. did he become

7、10. Nuclear science should be developed to benefit people _ harm them. A. more than B. rather than C. other than D. better than 11. John said that he was going to _ his wife home next year. A. advise B. accompany C. depart D. discard 12. Prices _ because of the change in economic policy. A. flew B.

8、skipped C. ran D. soared 13. If full credit were given to this part, it could _ a high grade for the student in his physical course. A. belong to B. be due to C. subject to D. contribute to 14. The teacher wrote a brief comment in the _ to show the student why it is wrong. A. mark B. margin C. mail

9、D. manual 科目代码:246 科目名称:英语 第 2 页 共 7 页 15. The response to our financial appeal _ anything we expected. A. impressed B. surprised C. surpassed D. passed 16. Every autumn the bears can be seen _ around this town of about 800 people. A. wondering B. wandering C. winding D. wounding 17. The population

10、bomb is a _ that has already happened in some parts of the world, with terrible results. A. distress B. miracle C. disaster D. giant 18. It is well admitted that the high _ rate is caused in part by failure to communicate. A. unemployment B. birth C. divorce D. inflation 19. The educational plan wil

11、l fail because it has no _. A. vacation B. version C. vision D. variation 20Mark offered to help me to learn English _. A. on duty B. in vain C. on purpose D. in earnest II. Cloze (20 points) Directions: There are 20 blanks in the following passage. For each blank there are four choices marked A, B,

12、 C and D. You should choose the ONE that best fits into the passage. Then write down your answer on the Answer Sheet. The United States has been working hard to _21_ Japan to make a momentous decision. _22_ Japan agrees, generations to come will curse _23_ day. _24_ the United States wants is for Ja

13、pan to free its _25_ forces for service overseas. _26_ recently, the Japanese government was being _27_ by Washington to send their troops to Persian Gulf. _28_ Tokyo said no, never. Then it said no, never,_29_. If Japanese soldiers go overseas to _30_ the Persian Gulf forces or perhaps _31_ some fu

14、ture U.N. peace-keeping mission, then we will have _32_: the nightmare of the Japanese and hundreds of other Asians come _33_. In violation of its _34_, Japans armed forces _35_ no longer be _36_ up in a military closet _37_ the key in civilian hands. Count _38_ this : the Japanese army will again b

15、ecome a political force at home, a _39_ threat to the delicate civilian equilibrium _40_ now protects Japans democratic society. 21. A. persuade B. order C. want D. hope 22. A. Because B. Since C. If D. Until 23. A. that B. a C. the D. any 24. A. Whether B. How C. When D. What 25. A. armed B. army C

16、. arm D. arms 26.A. Least B. Only C. Little D. Most 27. A. put B. pushed C. placed D. stationed 28. A. And B. Now C. Or D. First 29. A. something B. maybe C. however D. really 30. A fight B. help C. send D. join 31. A. in B. to C. on D. for 32. A. below B.it C. them D. these 33. A. alive B. active C

17、. along D. astir 34. A. government B. article C. report D. constitution 35. A. must B. will C. shall D. ought to 科目代码:246 科目名称:英语 第 3 页 共 7 页 36. A. looked B. woken C. dreamed D. locked 37. A. with B. but C. by D. having 38. A. down B. off C. on D. up 39. A. military B. war C. constant D. social 40.

18、 A. but B. up to C. that D. just III. Reading Comprehension (30 points) Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice and write

19、down your answer on the Answer Sheet. Passage 1 A variety of simple techniques can prevent computer crime, but more sophisticated methods are also necessary to prevent computer crimes. One technique to protect confidentiality is encryption(加密) . Information can be scrambled and unscrambled using mat

20、hematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by

21、several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge. Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control software verifies co

22、mputer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding sec

23、urity clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. Tokens are tamper-resist

24、ant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the tokens password, as well as another password entered by the user, and matches these two to an identical token passwo

25、rd generated by the computer and the users password, which is stored on a confidential list. In the future, passwords and tokens may be reinforced by biometrics (生物测定学), identification methods that use unique personal characteristics, such as fingerprints, skin oils, voice variations, and keyboard-t

26、yping rhythms. Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining acces

27、s to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computers functions. 41.Which of the following statements best expresses the main idea of the passage? A. There

28、 are many techniques used to prevent computer crime. B. People are eager to commit computer crime. 科目代码:246 科目名称:英语 第 4 页 共 7 页 C. Encryption is a useful technique to protect confidentiality. D. Password can prevent computer crime. 42. According to Paragraph 2, the keys are changed frequently in ord

29、er to _. A. encode more data B. decode more data C. give people more private keys D. make information difficult to decode 43. Which of the following passwords does not belong to biometrics? A. Numbers B. Fingerprints C. Skin oils D. Voice variations 44. “Vulnerable” in the last paragraph is closest

30、in meaning to “_”. A. susceptible B. changeable C. valuable D. dependable 45.According to this passage, “firewall” refers to “ _”. A. network functions B. access to information on a network C. a piece of device that protects the computers from being invaded or destroyed D. computer virus that can co

31、py computer programs Passage 2 Many private institutions of higher education around the country are in danger. Not all will be saved, and perhaps not all deserve to be saved. There are low-quality schools just as there are low-quality businesses. We have no obligation to save them simply because the

32、y exist. But many thriving institutions that deserve to continue are threatened. They are doing a fine job educationally, but they are caught in a financial difficulty, with no way to reduce rising costs or increase revenues significantly. Raising tuition doesnt bring in more revenue, for each time

33、tuition goes up, the enrollment goes down, or the amount that must be given away in student aid goes up. Schools are bad businesses, whether public or private, not usually because of bad management but because of the nature of the enterprise. They lose money on every customer, and they can go bankru

34、pt either from too few students or too many students. Even a very good college is a very bad business. It is such colleges, thriving but threatened, that I worry about. Low enrollment is not their chief problem. Even with full enrollments, they may go under. Efforts to save them, and preferably to k

35、eep them private, are a national necessity. There is no basis for arguing that private schools are bound to be better than public schools. There are abundant examples to the contrary. Anyone can name state universities and colleges that rank as the finest in the nation and the world. It is now inevi

36、table that public institutions will be dominant, and therefore diversity is a national necessity. Diversity in the way we support schools tends to give us a healthy diversity in the forms of education. In an imperfect society such as ours, uniformity of education throughout the nation could be dange

37、rous. In an imperfect society, diversity is a positive good. Eager supporters of public higher education know the importance of sustaining private higher education. 46.In the passage, the author appeals to the public to support_. A. private higher education in general B. public higher education in g

38、eneral C. high-quality private universities and colleges D. high-quality state universities and colleges 科目代码:246 科目名称:英语 第 5 页 共 7 页 47. According to the passage, schools are bad businesses because of _. A. the nature of school B. poor teachers C. bad management D. too few students 48. What does th

39、e phrase “go under (Par. 2, sentence 3) probably mean? A. Have low tuition B. Get into difficulties C. Do a bad job educationally D. Have high tuition 49. Which of the following statements is true? A. There are many cases to indicate that private schools are superior to public schools. B. The author

40、 thinks diversity of education is preferable to uniformity of education. C. A high-quality university is always a good business. D. Each time tuition is raised, the enrollment goes up. 50.In the authors opinion, the way that can save private schools lies in _. A. full enrollment B. raised tuition C.

41、 reducing student aid D. national support Passage 3 It started last year when a group of middle school children on a biology field trip in south-central Minnesota spotted some unusual-looking frogs. One was missing a leg, some had withered arms, others had shrunken eyes. Of the 22 frogs caught that

42、day, 11 were deformed. Their teacher told officials. Reports of strange frogs began to mount: a frog with nine legs; a clubfooted frog; a frog with three eyes, one of them in its throat. At first, investigators from the Minnesota Pollution Control Agency in St. Paul assumed that the problem was rest

43、ricted to their state, and the agricultural part at that. They were wrong. Deformed frogs have since turned up in Wisconsin, South Dakota, Vermont and up into Canada. “Abnormalities like this get me worried,” says David Hoppe, a University of Minnesota researcher. “We dont know how far this is going

44、 to go.” Because frogs spend much of their life in water, pesticides or harmful metals were prime suspects. But now possible causes include acid rain, global warming and increased ultraviolet light. Hoppe observes that different deformities seem to be concentrated in frogs from different regions. It

45、 may be, he says, that more than one cause is at work. What some scientists fear is that the frogs could be a sign that something is very wrong with the environment. “We may have a large problem here,” says Robert McKinnell, a University of Minnesota cancer researcher, who has collected hundreds of

46、deformed frogs. “If frogs are not able to handle whatever it is that is causing this, it may turn out that people cant either.” 51.What is the meaning of the word “deformed” in the first paragraph? A. Without form B. Form spoiled C. Form changed D. Formed again 52. The following are the possible cau

47、ses of strange frogs EXCEPT _. A. acid rain B. increased population C. global warming D. harmful metals 53. Which of the following statements is true according to the passage? A. Different deformities seem to be concentrated in frogs from different regions. B. Investigators declared that the problem

48、 of frogs was restricted to Minnesota. 科目代码:246 科目名称:英语 第 6 页 共 7 页 C. Unusual frogs were first discovered by researchers is Pollution Control Agency. D.Scientists fear that these frogs could be a sign of something wrong with frogs of past generation. 54. The following words appearing in the passage

49、 have similar meanings EXCEPT _. A. unusual B. strange C. different D. wrong 55.Robert McKinnells remarks imply that _. A. people cannot solve this problem since frogs cannot B. people do not have such a problem even if frogs have C. the reason for strange frogs is unknown D. there is a large proble

50、m with environment Passage 4 It was September of 1620 when their ship, called the “Mayflower” left port with 102 men, women and children on board. This was the worst season of the year for an ocean crossing, and the trip was very uneven. After sixty-five days at sea, she landed in Provincetown Harbo

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 大学
版权提示 | 免责声明

1,本文(2015年南京航空航天大学考研专业课试题246二外英语.pdf)为本站会员(雁南飞1234)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|