1、共 13 页 第 1 页 电子科技大学电子科技大学 20162016 年攻读硕士学位研究生入学考试试题年攻读硕士学位研究生入学考试试题 考试科目:考试科目:244 244 英语英语(二外二外 仅日语方向仅日语方向)注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。注:无机读卡,所有答案必须写在答题纸上,写在试卷或草稿纸上均无效。Part I Reading Comprehension(40%)Directions:There are 4 passages in this part.Each passage is followed by some questions or unf
2、inished statements.For each of them there are four choices marked A),B),C)and D).You should decide on the best choice and then write the corresponding letter on the Answer Sheet Passage One Questions 1 to 5 are based on the following passage.A recurring criticism of the UKs university sector is its
3、perceived weakness in translating new knowledge into new products and services.Recently,the UK National Stem Cell Network warned the UK could lose its place among the world leaders in stem cell research unless adequate funding and legislation could be assured.We should take this concern seriously as
4、 universities are key in the national innovation system.However,we do have to challenge the unthinking complaint that the sector does not do enough in taking ideas to market.The most recent comparative data on the performance of universities and research institutions in Australia,Canada,USA and UK s
5、hows that,from a relatively weak starting position,the UK now leads on many indicators of commercialization activity.When viewed at the national level,the policy interventions of the past decade have helped transform the performance of UK universities.Evidence suggests the UKs position is much stron
6、ger than in the recent past and is still showing improvement.But national data masks the very large variation in the performance of individual universities.The evidence shows that a large number of universities have fallen off the back of the pack,a few perform strongly and the rest chase the leader
7、s.This type of uneven distribution is not peculiar to the UK and is mirrored across other economies.In the UK,research is concentrated:less than 25%of universities receive 75%of the research funding.These same universities are also the institutions producing the greatest share of PhD graduates,scien
8、ce citations,patents and license income.The effect of policies generating long-term resource concentration has also created a distinctive set of universities which are research-led and commercially active.It seems clear that the concentration of research and commercialization work creates difference
9、s between universities.共 13 页 第 2 页 The core objective for universities which are research-led must be to maximize the impact of their research efforts.These universities should be generating the widest range of social,economic and environmental benefits.In return for the scale of investment,they sh
10、ould share their expertise in order to build greater confidence in the sector.Part of the economic recovery of the UK will be driven by the next generation of research commercialization spilling out of our universities.There are three dozen universities in the UK which are actively engaged in advanc
11、ed research training and commercialization work.If there was a greater coordination of technology transfer offices within regions and a simultaneous investment in the scale and functions of our graduate schools,universities could,and should,play a key role in positioning the UK for the next growth c
12、ycle.1.What does the author think of UK universities in terms of commercialization?A)They fail to convert knowledge into money.B)They do not regard it as their responsibility.C)They still have a place among the world leaders.D)They have lost their leading position in many ways.2.What does the author
13、 say about the national data on UK universities performance in commercialization?A)It masks the fatal weaknesses of government policy.B)It does not rank UK universities in a scientific way.C)It does not reflect the differences among universities.D)It indicates their ineffective use of government res
14、ources.3.We can infer from Paragraph 5 that policy interventions(Line 1,Para.4)refers to _.A)government aid to non-research-oriented universities B)compulsory cooperation between universities and industries C)fair distribution of funding for universities and research institutions D)concentration of
15、resources in a limited number of universities 4.What does the author suggest research-led universities do?A)Publicize their research to win international recognition.B)Fully utilize their research to benefit all sectors of society.C)Generously share their facilities with those short of funds.D)Sprea
16、d their influence among top research institutions.5.How can the university sector play a key role in the UKs economic growth?A)By establishing more regional technology transfer offices.B)By asking the government to invest in technology transfer research.共 13 页 第 3 页 C)By promoting technology transfe
17、r and graduate school education.D)By increasing the efficiency of technology transfer agencies.Passage Two Questions 6 to 10 are based on the following passage.Most office workers assume that the messages they send to each other via electronic mail are as private as a telephone call or a face-to-fac
18、e meeting.That assumption is wrong.Although it is illegal in many areas for an employer to eavesdrop on private conversations or telephone callseven if they take place on a company-owned telephonethere are no clear rules governing electronic mail.In fact,the question of how private electronic mail t
19、ransmissions should be has emerged as one of the more complicated legal issues of the electronic age.Peoples opinions about the degree of privacy that electronic mail should have vary depending on whose electronic mail system is being used and who is reading the messages.Does a government office,for
20、 example,have the right to destroy electronic messages created in the course of running the government,thereby denying public access to such documents?Some hold that government offices should issue guidelines that allow their staff to delete such electronic records,and defend this practice by claimi
21、ng that the messages thus deleted already exist in paper versions whose destruction is forbidden.Opponents of such practices argue that the paper versions often omit such information as who received the messages and when they received them,information commonly carried on electronic mail systems.Gove
22、rnment officials,opponents maintain,are civil servants;the public should thus have the right to review any documents created during the conducting of government business.Questions about electronic mail privacy have also arisen in the private sector.Recently,two employees of an automotive company wer
23、e discovered to have been communicating disparaging information about their supervisor via electronic mail.The supervisor,who had been monitoring the communication,threatened to fire the employees.When the employees filed a grievance complaining that their privacy had been violated,they were let go.
24、Later,their court case for unlawful termination was dismissed;the companys lawyers successfully argued that because the company owned the computer system,its supervisors had the right to read anything created on it.In some areas,laws prohibit outside interception of electronic mail by a third party
25、without proper authorization such as a search warrant.However,these laws do not cover“inside”interception such as occurred at the automotive company.In the past,courts have ruled that interoffice communications may be considered private only if employees have a“reasonable expectation”of privacy when
26、 they send the messages.The fact is that no absolute guarantee of privacy exists in any computer system.The only solution may be for users to scramble their own messages with encryption codes;unfortunately,such complex codes are likely to undermine the principal virtue of electronic mail:its conveni
27、ence.6.Which one of the following statements most accurately summarizes the main point of the passage?共 13 页 第 4 页 A)Until the legal questions surrounding the privacy of electronic mail in both the public and private sectors have been resolved,office workers will need to scramble their electronic ma
28、il messages with encryption codes.B)The legal questions surrounding the privacy of electronic mail in the work place can best be resolved by treating such communications as if they were as private as telephone conversations or face-to-face meetings.C)Any attempt to resolve the legal questions surrou
29、nding the privacy of electronic mail in the workplace must take into account the essential difference between public-sector and private sector business.D)At present,in both the public and private sectors,there seem to be no clear general answers to the legal questions surrounding the privacy of elec
30、tronic mail in the workplace.7.According to the passage,which one of the following best expresses the reason some people use to oppose the deletion of electronic mail records at government offices?A)Such deletion reveals the extent of governments unhealthy obsession with secrecy.B)Such deletion runs
31、 counter to the notion of governments accountability(责任)to its constituency(选民,支持者).C)Such deletion clearly violates the legal requirement that government offices keep duplicate copies of all their transactions.D)Such deletion violates the governments own guidelines against destruction of electronic
32、 records.8.Which one of the following most accurately states the organization of the passage?A)A problem is introduced,followed by specific examples illustrating the problem:a possible solution is suggested,followed by an acknowledgment of its shortcomings.B)A problem is introduced,followed by expli
33、cations of two possible solutions to the problem:the first solution is preferred to the second,and reasons are given for why it is the better alternative.C)A problem is introduced,followed by analysis of the historical circumstances that helped bring the problem about,and a possible solution is offe
34、red and rejected as being only a partial remedy.D)A problem is introduced,followed by enumeration of various questions that need to be answered before a solution can be found:one possible solution is proposed and argued for.9.There are four opinions about an encryption system that could encode and d
35、ecode electronic mail messages with a single keystroke.Which one would the author most likely hold?A)It would be an unreasonable burden on a companys ability to monitor electronic mail created by its employees.B)It would significantly reduce the difficulty of attempting to safeguard the privacy of e
36、lectronic mail.共 13 页 第 5 页 C)It would create substantial legal complications for companies trying to prevent employees from revealing trade secrets to competitors.D)It would guarantee only a minimal level of employee privacy,and so would not be worth the cost involved in installing such a system.10
37、.Given the information in the passage,which one of the following hypothetical events is LEAST likely to occur?A)A court rules that a government offices practice of deleting its electronic mail is not in the publics best interests.B)A private-sector employer is found liable for eavesdropping an offic
38、e telephone conversation in which two employees exchanged disparaging information about their supervisor.C)A court upholds the right of a government office to destroy both paper and electronic versions of its in-house documents.D)A court upholds a private-sector employers right to monitor messages s
39、ent between employees over the companys in-house electronic mail system.Passage Three Questions 11 to 15 are based on the following passage.Computers have been taught to play not only checkers,but also championship chess,which is a fairly accurate yardstick for measuring the computers progress in th
40、e ability to learn from experience.Because the game requires logical reasoning,chess would seem to be perfectly suited to the computer.all a programmer has to do is give the computer a program evaluating the consequences of every possible response to every possible move,and the computer will win eve
41、ry time.In theory this is a sensible approach;in practice it is impossible.Today,a powerful computer can analyze 40 000 moves a second.That is an impressive speed,but there are an astronomical number of possible moves in chessliterally trillions.Even if such a program were written,there is no comput
42、er capable of holding that much data.Therefore,if the computer is to compete at championship levels,it must be programmed to function with less than complete data.It must be able to learn from experience,to modify its own program,to deal with a relatively unstructured situationin a word,to“think”for
43、 itself.In fact,this can be done.Chess-playing computers have yet to defeat world champion chess players,but several have beaten human players of only slightly lower ranks.The computers have had programs to carry them through the early,mechanical stages of their chess games.But they have gone on fro
44、m there to reason and learn,and sometimes to win the game.There are other proofs that computers can be programmed to learn,but this example is sufficient to demonstrate the point.Granted,winning a game of chess is not an earthshaking event even when a computer does it.But there are many serious huma
45、n problems which can be fruitfully approached as games.The Defense Department uses computers to play war games and work out 共 13 页 第 6 页 strategies for dealing with international tensions.Other problemsinternational and interpersonal relations,ecology and economics,and the ever-increasing threat of
46、world faminecan perhaps be solved by the joint efforts of human beings and truly intelligent computers.11.The purpose of creating chess-playing computers is _ A)to win the world chess champion B)to pave the way for further intelligent computers C)to work out strategies for international wars D)to fi
47、nd an accurate yardstick for measuring computer progress 12.Today,a chess-playing computer can be programmed to _ A)give trillions of responses in a second to each possible move and win the game B)function with complete data and beat the best players C)learn from chess-playing in the early stage and
48、 go on to win the game D)evaluate every possible move but may fail to give the right response each time 13.For a computer to“think”,it is necessary to _ A)mange to process as much data as possible in a second B)program it so that it can learn from its experiences C)prepare it for chess-playing first
49、 D)enable it to deal with unstructured situations 14.The authors attitude towards the Defense Department is_ A)critical B)unconcerned C)positive D)negative 15.In the authors opinion,_ A)winning a chess game is an unimportant event B)serious human problems shouldnt be regarded as playing a game C)eco
50、logical problems are more urgent to be solved D)there is hope for more intelligent computers Passage Four Questions 16 to 20 are based on the following passage.The first two stages in the development of civilized man were probably the invention of primitive weapons and the discovery of fire,although