欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【考研类试卷】考博英语-435及答案解析.doc

    • 资源ID:1387858       资源大小:139.50KB        全文页数:26页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【考研类试卷】考博英语-435及答案解析.doc

    1、考博英语-435 及答案解析(总分:100.00,做题时间:90 分钟)一、Section Vocabulary(总题数:20,分数:20.00)1.Harry was_by a bee when he was collecting the honey.(分数:1.00)A.stungB.stuckC.bittenD.scratched2.I dont think its wise of you to_your greater knowledge in front of the di rector, for it may offend him.(分数:1.00)A.show upB.show

    2、outC.show inD.show off3.We had to_a lot of noise when the children were at home.(分数:1.00)A.go in forB.hold on toC.put up withD.keep pace with4.The returns in the short_may be small, but over a number of years the in vestment will be well repaid.(分数:1.00)A.intervalB.rangeC.spanD.term5.A persons calor

    3、ie requirements vary_his life.(分数:1.00)A.acrossB.throughoutC.overD.within6.However, at times this balance in nature is_, resulting in a number of possibly unforeseen effects.(分数:1.00)A.troubledB.disturbedC.confusedD.puzzled7.In a time of social reform, peoples state of mind tends to keep_with the ra

    4、pid changes of society.(分数:1.00)A.stepB.progressC.paceD.touch8.She worked hard at her task before she felt sure that the results would_her long effort.(分数:1.00)A.justifyB.testifyC.rectifyD.verify9.He offered to_her a hand as the suitcase was too heavy for her to carry.(分数:1.00)A.helpB.showC.lendD.bo

    5、rrow10.A thorough study of biology requires_with the properties of trees and plants, and the habit of birds and beasts.(分数:1.00)A.acquisitionB.discriminationC.curiosityD.familiarity11.Im very glad to know that my boss has generously agreed to_my debt in return for certain services.(分数:1.00)A.take aw

    6、ayB.cut outC.write offD.clear up12.There were many people present and he appeared only for a few seconds, so I only caught a_of him.(分数:1.00)A.glanceB.glimpseC.lookD.sight13.The machine needs a complete_since it has been in use for over ten years.(分数:1.00)A.amendingB.fittingC.mendingD.renovating14.T

    7、he patients health failed to such an extent that he was put into_care.(分数:1.00)A.tenseB.rigidC.intensiveD.tight15.Some journalists often overstate the situation so that their news may create a great_.(分数:1.00)A.explosionB.sensationC.exaggerationD.stimulation16.According to what you have just said, a

    8、m I to understand that his new post no responsibility with it at all?(分数:1.00)A.shouldersB.possessesC.carriesD.shares17.Sometimes the student may be asked to write about his_to a certain book or article that has some bearing on the subject being studied.(分数:1.00)A.commentB.reactionC.impressionD.comp

    9、rehension18.Criticism and self-criticism are necessary_they help us to find and correct our mistakes.(分数:1.00)A.by thatB.at thatC.on thatD.in that19.Although the accident did very little_to the car, I still suggest that you drive more carefully next time.(分数:1.00)A.demolishmentB.ruinC.destructionD.d

    10、amage20.Generous public funding of basic science would_considerable benefits for the countrys health, wealth and security.(分数:1.00)A.lead toB.result fromC.lie inD.settle down二、SectionCloze(总题数:1,分数:15.00)In the past few decades, remarkable findings have been made in ethology, the study of animal soc

    11、ial behavior. Earlier scientists had (21) that nonhuman social life was almost totally instinctive or fixed by genetics. Much more careful observation has shown that (22) variation occurs among the social ties of most species, showing that learning is a part of social life. That is, the (23) are not

    12、 solely fixed by the genes (24) , the learn ing that occurs is often at an early age in a process that is called imprinting. Imprinting is clearly (25) instinctive, but it is not quite like the learning of humans; it is something in between the two. An illustration best (26) the nature of imprinting

    13、. Once, biologists thought that ducklings followed the mother duck because of instincts. Now we know that, shortly (27) they hatch, ducklings fix (28) any object about the size of a duck and will henceforth follow it. So ducklings may follow a basketball or a briefcase if these are (29) for the moth

    14、er duck at the time when imprinting occurs. Thus, social ties can be considera bly (30) , even ones that have a considerable base (31) by genetics.Even among the social insects something like imprinting (32) influence social behav ior. For example, biologists once thought bees communicated with othe

    15、rs purely (33) in stinct. But, in examining a “dance“ that bees do to indicate the distance and direction of a pollen source, observers found that bees raised in isolation could not communicate effec tively. At a higher level, the genetic base seems to be much more for an all-purpose learn ing rathe

    16、r than the more specific responses of imprinting. Chimpanzees, for instance, gen erally (34) very good mother but Jane Goodali reports that some chimps carry the infant upside down or (35) fail to nurture the young.(分数:15.00)A.assumedB.adoptedC.believedD.surmisedA.considerateB.consideredC.considerab

    17、leD.consideringA.statuesB.statusesC.statutesD.staturesA.Whats moreB.HenceC.ButD.HoweverA.notB.onlyC.butD.solelyA.clarifiesB.classifiesC.definesD.outlinesA.thanB.beforeC.whenD.afterA.onB.withC.inD.withinA.appropriatedB.substitutedC.assignedD.distributedA.variedB.deviatedC.differedD.alteredA.fashioned

    18、B.modifiedC.influencedD.affectedA.mayB.shouldC.mustD.canA.byB.out ofC.fromD.throughA.proveB.makeC.turnD.createA.otherwiseB.stillC.yetD.even三、Section Reading Co(总题数:4,分数:20.00)1Today cognitive theorists empirically study the impact of feelings on cognitive proces ses such as memory and judgment and a

    19、lso the reciprocal influence of cognition on emotion. However, evolutionary theorists view emotion as a powerful source of motiva tionan internal communication that something must be done. For example, when people are threatened, they feel fear, which in turn leads them to deal with the threatening

    20、situa tion through either fight or flight. Emotions and drives may also operate in tandem to moti vate action, as when excitement accompanies sexual arousal. From an evolutionary per spective, different emotions serve different functions. Fear facilitates flight in the face of danger; disgust preven

    21、ts ingestion of potentially toxic substances such as rotting meat.An emotion that is less well understood is jealousy. Why do people become jealous in intimate sexual relationships? One series of studies tested evolutionary hypotheses about differences in the concerns men and women have about their

    22、partners fidelity. Since fe males can have only a limited number of children during their lifetimes, to maximize their reproductive success they should be motivated to form relationships with males who have resources and will contribute them to their offspring. Indeed, cross-cultural evidence dem on

    23、strates that one of the main mate selection criteria used by females around the world is male resources. From a females point of view, then, infidelity accompanied by emotional commitment to the other woman is a major threat to resources. A man unlikely to divert re sources from his mate and her off

    24、spring to a casual fling, but the risk increases dramatical ly if he becomes emotionally involved and perhaps considers switching long-term partners. Hence, a womans jealousy would be expected to focus on her mates emotional commitment to another female.For males, the situation is different. If a ma

    25、le commits himself to an exclusive rela tionship with a female, he must be certain that the offspring in whom he is investing are his own. Since he cannot be sure of paternity, the best he can do is to prevent his mate from copulating with any other males. In males, then, jealousy would be expected

    26、to focus less on the females emotional commitment or resources and more on her tendency to give other males sexual access. Indeed, in species ranging from insects to humans, males take extreme measures to prevent other males from inseminating their mates. In humans, male sexual jealousy is the leadi

    27、ng cause of homicides and of spouse battering cross-culturally.(分数:5.00)(1).This passage discusses the_approach to human emotions.(分数:1.00)A.evolutionaryB.cognitiveC.psychologicalD.economic(2).Evolutionary theorists view emotion as all of the following except_.(分数:1.00)A.cognitive processesB.a sourc

    28、e of motivationC.something promoting actionD.serving various functions(3).The idea presented in the 2nd paragraph can be best described as_.(分数:1.00)A.realisticB.materialisticC.ironicalD.offspring-oriented(4).According to the evolutionary perspective, womens jealousy ultimately stems from_.(分数:1.00)

    29、A.concern over their husbands reproductive abilityB.fear that their husbands resources would be threatenedC.their husbands divided attention to them and their offspringD.their emotional instability resulting from their husbands infidelity(5).According to this passage, a mans jealousy is mainly focus

    30、ed on_.(分数:1.00)A.a concern over their wives resourcesB.the fatherhood of the offspring to whom he is investingC.their mates emotional commitmentD.the legitimacy of their marriage2 While hackers with motives make headlines, they represent less than 200% of all net work security breaches. More common

    31、 are instances of authorized users accidentally wind ing up where they should not be and inadvertently deleting or changing data. However, the Internet introduces another concern: some Internet surfers are bound to go where they have no business and, in so doing, threaten to wipe out data to which t

    32、hey should not have access.Before picking a firewall, companies need to adopt security policies. A security policy states who or what is allowed to connect to whom or what. You can group all users by de partment or classification. The better firewall products let you drag and drop groups in a graphi

    33、cal user interface (GUI) environment to define network security easily.Two methods are most often used together to establish an Internet firewall. They are application and circuit gateways, as well as packet filtering. With application and circuit gateways, all packets are addressed to a user-level

    34、application on a gate-way that relays packets between two points. With most application gateways, additional packet-filter ma chines are required to control and screen traffic between the gateway and the networks. A“ typical configuration includes two routers. With a bastion host that serves as the

    35、application gateway sitting between them.A drawback to application and circuit gateways is that they slow network perform- ance. This is because each packet must be copied and processed at least twice by all the communication layers. Packet-filter gateways, which act as routers between two nets, are

    36、 less secure than application gateways but more efficient. They are transparent to many pro tocols and applications, and they require no changes in client applications, no specific ap plication management or installation, and no extra hardware.Using a single, unified packet-filter engine, all net tr

    37、affic is processed and then for warded or blocked from a single point of control. However, most packet filters are state less, understand only low-level protocols, and are difficult to configure and verity. In ad dition, they lack audit mechanisms. Some packet filters are implemented inside routers,

    38、 limiting computing power and filtering capabilities. Others are implemented as software packages that filter the packets in application-layer processes, an inefficient approach that requires multiple data copies, expensive delays and context switches and delivers lower throughput.So whats a network

    39、 administrator to do? Some vendors are developing firewalls that overcome many of these problems and combine the advantages of application gateways and packet filtering. These efficient, protocol-independent, secure firewall engines are capable of application-level security, user authentication, uni

    40、fied support, and handling of all protocols, auditing and altering. They are transparent to users and to system setup, and include a GUI for simple and flexible system management and configuration.(分数:5.00)(1).The most suitable title for this passage is_.(分数:1.00)A.Hackers and Our DefenseB.Internet

    41、Surfers GuideC.Firewall: A Measure of Network SecurityD.Information Technology(2).According to what you have read, the authors probable preference will be_.(分数:1.00)A.waiting for the coming of better firewall productsB.finding a combination of both application gateway and packet filtering approachC.

    42、meeting demands of every type with better productsD.implementing one better approach in the adoption of a firewall solution(3).In choosing a firewall product, what is implied as the main concern of the author?(分数:1.00)A.Management.B.Transparency.C.Independence.D.Efficiency.(4).Which of the following

    43、 can be inferred from the passage concerning the networks using application and circuit gateways?(分数:1.00)A.Secure and speedy.B.Secure but slow.C.Insecure and slow.D.Insecure but speedy.(5).For whom is this passage most likely written?(分数:1.00)A.Government officials.B.Hackers.C.Network administrator

    44、s.D.Computer experts.3The Internet is a global network that connects other computer networks, together with software and protocols for controlling the movement of data. The Internet, often re ferred to as “the Net“, was initiated in 1969 by a group of universities and private re search groups funded

    45、 by the US Department of Defense. It now covers almost every country in the world. Its organization is informal and deliberately nonpolitical; its controllers tend to concentrate on technical aspects rather than on administrative control.The Internet offers users a number of basic services including

    46、 data transfer, electronic mail, and the ability to access information in remote databases. A notable feature is the ex istence of user groups, which allow people to exchange information and debate specific subjects of interest. In addition, there are a number of high-level services. For example, MB

    47、ONE allows the transmission of messages to more than one destination. It is used in videoconferencing. The World Wide Web, known as “the Web“, is another high level In- ternet service, developed in the 1990s in Geneva. It is a service for distributing multimedia information, including graphics, pict

    48、ures, sounds, and video as well as text. A feature of the World Wide Web is that it allows links to other related documents elsewhere on the In ternet. Documents for publication on the Web are presented in a form known as HTML (hypertext mark up language). This allows a specification of the page lay

    49、out and typogra phy as it will appear on the screen. It also allows the inclusion of active links to other docu ments. Generally, these appear on the screen display as highlighted text or as additional icons. Typically, the user can use a mouse to “click“ on one of these points to load and view a related document. Many commercial and public organizations now have their own Web site (specified by an address code) and publish a “home page


    注意事项

    本文(【考研类试卷】考博英语-435及答案解析.doc)为本站会员(figureissue185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开