2016年电子科技大学考研专业课试题英语(二外仅日语方向).pdf

上传人(卖家):雁南飞1234 文档编号:3555584 上传时间:2022-09-17 格式:PDF 页数:13 大小:384.56KB
下载 相关 举报
2016年电子科技大学考研专业课试题英语(二外仅日语方向).pdf_第1页
第1页 / 共13页
亲,该文档总共13页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、共 13 页 第 1 页 电子科技大学电子科技大学 20162016 年攻读硕士学位研究生入学考试试题年攻读硕士学位研究生入学考试试题 考试科目:考试科目:244 244 英语英语(二外二外 仅日语方向仅日语方向)注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。Part I Reading Comprehension(40%)Directions:There are 4 passages in this part.Each passage is followed by some questions or unf

2、inished statements.For each of them there are four choices marked A),B),C)and D).You should decide on the best choice and then write the corresponding letter on the Answer Sheet Passage One Questions 1 to 5 are based on the following passage.A recurring criticism of the UKs university sector is its

3、perceived weakness in translating new knowledge into new products and services.Recently,the UK National Stem Cell Network warned the UK could lose its place among the world leaders in stem cell research unless adequate funding and legislation could be assured.We should take this concern seriously as

4、 universities are key in the national innovation system.However,we do have to challenge the unthinking complaint that the sector does not do enough in taking ideas to market.The most recent comparative data on the performance of universities and research institutions in Australia,Canada,USA and UK s

5、hows that,from a relatively weak starting position,the UK now leads on many indicators of commercialization activity.When viewed at the national level,the policy interventions of the past decade have helped transform the performance of UK universities.Evidence suggests the UKs position is much stron

6、ger than in the recent past and is still showing improvement.But national data masks the very large variation in the performance of individual universities.The evidence shows that a large number of universities have fallen off the back of the pack,a few perform strongly and the rest chase the leader

7、s.This type of uneven distribution is not peculiar to the UK and is mirrored across other economies.In the UK,research is concentrated:less than 25%of universities receive 75%of the research funding.These same universities are also the institutions producing the greatest share of PhD graduates,scien

8、ce citations,patents and license income.The effect of policies generating long-term resource concentration has also created a distinctive set of universities which are research-led and commercially active.It seems clear that the concentration of research and commercialization work creates difference

9、s between universities.共 13 页 第 2 页 The core objective for universities which are research-led must be to maximize the impact of their research efforts.These universities should be generating the widest range of social,economic and environmental benefits.In return for the scale of investment,they sh

10、ould share their expertise in order to build greater confidence in the sector.Part of the economic recovery of the UK will be driven by the next generation of research commercialization spilling out of our universities.There are three dozen universities in the UK which are actively engaged in advanc

11、ed research training and commercialization work.If there was a greater coordination of technology transfer offices within regions and a simultaneous investment in the scale and functions of our graduate schools,universities could,and should,play a key role in positioning the UK for the next growth c

12、ycle.1.What does the author think of UK universities in terms of commercialization?A)They fail to convert knowledge into money.B)They do not regard it as their responsibility.C)They still have a place among the world leaders.D)They have lost their leading position in many ways.2.What does the author

13、 say about the national data on UK universities performance in commercialization?A)It masks the fatal weaknesses of government policy.B)It does not rank UK universities in a scientific way.C)It does not reflect the differences among universities.D)It indicates their ineffective use of government res

14、ources.3.We can infer from Paragraph 5 that policy interventions(Line 1,Para.4)refers to _.A)government aid to non-research-oriented universities B)compulsory cooperation between universities and industries C)fair distribution of funding for universities and research institutions D)concentration of

15、resources in a limited number of universities 4.What does the author suggest research-led universities do?A)Publicize their research to win international recognition.B)Fully utilize their research to benefit all sectors of society.C)Generously share their facilities with those short of funds.D)Sprea

16、d their influence among top research institutions.5.How can the university sector play a key role in the UKs economic growth?A)By establishing more regional technology transfer offices.B)By asking the government to invest in technology transfer research.共 13 页 第 3 页 C)By promoting technology transfe

17、r and graduate school education.D)By increasing the efficiency of technology transfer agencies.Passage Two Questions 6 to 10 are based on the following passage.Most office workers assume that the messages they send to each other via electronic mail are as private as a telephone call or a face-to-fac

18、e meeting.That assumption is wrong.Although it is illegal in many areas for an employer to eavesdrop on private conversations or telephone callseven if they take place on a company-owned telephonethere are no clear rules governing electronic mail.In fact,the question of how private electronic mail t

19、ransmissions should be has emerged as one of the more complicated legal issues of the electronic age.Peoples opinions about the degree of privacy that electronic mail should have vary depending on whose electronic mail system is being used and who is reading the messages.Does a government office,for

20、 example,have the right to destroy electronic messages created in the course of running the government,thereby denying public access to such documents?Some hold that government offices should issue guidelines that allow their staff to delete such electronic records,and defend this practice by claimi

21、ng that the messages thus deleted already exist in paper versions whose destruction is forbidden.Opponents of such practices argue that the paper versions often omit such information as who received the messages and when they received them,information commonly carried on electronic mail systems.Gove

22、rnment officials,opponents maintain,are civil servants;the public should thus have the right to review any documents created during the conducting of government business.Questions about electronic mail privacy have also arisen in the private sector.Recently,two employees of an automotive company wer

23、e discovered to have been communicating disparaging information about their supervisor via electronic mail.The supervisor,who had been monitoring the communication,threatened to fire the employees.When the employees filed a grievance complaining that their privacy had been violated,they were let go.

24、Later,their court case for unlawful termination was dismissed;the companys lawyers successfully argued that because the company owned the computer system,its supervisors had the right to read anything created on it.In some areas,laws prohibit outside interception of electronic mail by a third party

25、without proper authorization such as a search warrant.However,these laws do not cover“inside”interception such as occurred at the automotive company.In the past,courts have ruled that interoffice communications may be considered private only if employees have a“reasonable expectation”of privacy when

26、 they send the messages.The fact is that no absolute guarantee of privacy exists in any computer system.The only solution may be for users to scramble their own messages with encryption codes;unfortunately,such complex codes are likely to undermine the principal virtue of electronic mail:its conveni

27、ence.6.Which one of the following statements most accurately summarizes the main point of the passage?共 13 页 第 4 页 A)Until the legal questions surrounding the privacy of electronic mail in both the public and private sectors have been resolved,office workers will need to scramble their electronic ma

28、il messages with encryption codes.B)The legal questions surrounding the privacy of electronic mail in the work place can best be resolved by treating such communications as if they were as private as telephone conversations or face-to-face meetings.C)Any attempt to resolve the legal questions surrou

29、nding the privacy of electronic mail in the workplace must take into account the essential difference between public-sector and private sector business.D)At present,in both the public and private sectors,there seem to be no clear general answers to the legal questions surrounding the privacy of elec

30、tronic mail in the workplace.7.According to the passage,which one of the following best expresses the reason some people use to oppose the deletion of electronic mail records at government offices?A)Such deletion reveals the extent of governments unhealthy obsession with secrecy.B)Such deletion runs

31、 counter to the notion of governments accountability(责任)to its constituency(选民,支持者).C)Such deletion clearly violates the legal requirement that government offices keep duplicate copies of all their transactions.D)Such deletion violates the governments own guidelines against destruction of electronic

32、 records.8.Which one of the following most accurately states the organization of the passage?A)A problem is introduced,followed by specific examples illustrating the problem:a possible solution is suggested,followed by an acknowledgment of its shortcomings.B)A problem is introduced,followed by expli

33、cations of two possible solutions to the problem:the first solution is preferred to the second,and reasons are given for why it is the better alternative.C)A problem is introduced,followed by analysis of the historical circumstances that helped bring the problem about,and a possible solution is offe

34、red and rejected as being only a partial remedy.D)A problem is introduced,followed by enumeration of various questions that need to be answered before a solution can be found:one possible solution is proposed and argued for.9.There are four opinions about an encryption system that could encode and d

35、ecode electronic mail messages with a single keystroke.Which one would the author most likely hold?A)It would be an unreasonable burden on a companys ability to monitor electronic mail created by its employees.B)It would significantly reduce the difficulty of attempting to safeguard the privacy of e

36、lectronic mail.共 13 页 第 5 页 C)It would create substantial legal complications for companies trying to prevent employees from revealing trade secrets to competitors.D)It would guarantee only a minimal level of employee privacy,and so would not be worth the cost involved in installing such a system.10

37、.Given the information in the passage,which one of the following hypothetical events is LEAST likely to occur?A)A court rules that a government offices practice of deleting its electronic mail is not in the publics best interests.B)A private-sector employer is found liable for eavesdropping an offic

38、e telephone conversation in which two employees exchanged disparaging information about their supervisor.C)A court upholds the right of a government office to destroy both paper and electronic versions of its in-house documents.D)A court upholds a private-sector employers right to monitor messages s

39、ent between employees over the companys in-house electronic mail system.Passage Three Questions 11 to 15 are based on the following passage.Computers have been taught to play not only checkers,but also championship chess,which is a fairly accurate yardstick for measuring the computers progress in th

40、e ability to learn from experience.Because the game requires logical reasoning,chess would seem to be perfectly suited to the computer.all a programmer has to do is give the computer a program evaluating the consequences of every possible response to every possible move,and the computer will win eve

41、ry time.In theory this is a sensible approach;in practice it is impossible.Today,a powerful computer can analyze 40 000 moves a second.That is an impressive speed,but there are an astronomical number of possible moves in chessliterally trillions.Even if such a program were written,there is no comput

42、er capable of holding that much data.Therefore,if the computer is to compete at championship levels,it must be programmed to function with less than complete data.It must be able to learn from experience,to modify its own program,to deal with a relatively unstructured situationin a word,to“think”for

43、 itself.In fact,this can be done.Chess-playing computers have yet to defeat world champion chess players,but several have beaten human players of only slightly lower ranks.The computers have had programs to carry them through the early,mechanical stages of their chess games.But they have gone on fro

44、m there to reason and learn,and sometimes to win the game.There are other proofs that computers can be programmed to learn,but this example is sufficient to demonstrate the point.Granted,winning a game of chess is not an earthshaking event even when a computer does it.But there are many serious huma

45、n problems which can be fruitfully approached as games.The Defense Department uses computers to play war games and work out 共 13 页 第 6 页 strategies for dealing with international tensions.Other problemsinternational and interpersonal relations,ecology and economics,and the ever-increasing threat of

46、world faminecan perhaps be solved by the joint efforts of human beings and truly intelligent computers.11.The purpose of creating chess-playing computers is _ A)to win the world chess champion B)to pave the way for further intelligent computers C)to work out strategies for international wars D)to fi

47、nd an accurate yardstick for measuring computer progress 12.Today,a chess-playing computer can be programmed to _ A)give trillions of responses in a second to each possible move and win the game B)function with complete data and beat the best players C)learn from chess-playing in the early stage and

48、 go on to win the game D)evaluate every possible move but may fail to give the right response each time 13.For a computer to“think”,it is necessary to _ A)mange to process as much data as possible in a second B)program it so that it can learn from its experiences C)prepare it for chess-playing first

49、 D)enable it to deal with unstructured situations 14.The authors attitude towards the Defense Department is_ A)critical B)unconcerned C)positive D)negative 15.In the authors opinion,_ A)winning a chess game is an unimportant event B)serious human problems shouldnt be regarded as playing a game C)eco

50、logical problems are more urgent to be solved D)there is hope for more intelligent computers Passage Four Questions 16 to 20 are based on the following passage.The first two stages in the development of civilized man were probably the invention of primitive weapons and the discovery of fire,although

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 大学
版权提示 | 免责声明

1,本文(2016年电子科技大学考研专业课试题英语(二外仅日语方向).pdf)为本站会员(雁南飞1234)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|