欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【考研类试卷】考研英语-试卷140及答案解析.doc

    • 资源ID:1398395       资源大小:151.50KB        全文页数:24页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【考研类试卷】考研英语-试卷140及答案解析.doc

    1、考研英语-试卷 140 及答案解析(总分:142.00,做题时间:90 分钟)一、Use of English(总题数:2,分数:80.00)1.Section I Use of EnglishDirections: Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C or D.(分数:40.00)_Even plants can run a fever, especially when they are under attack by insects or dise

    2、ase. But (1)_ humans, plants can have their temperature (2)_ from 3,000 feet awaystraight up. A decade ago, (3)_ the infrared scanning technology developed for military purpose and other satellites, physicist Stephen Paley (4)_ a quick way to take the temperature of crops to determine (5)_ ones are

    3、under stress. The goal was to let farmer (6)_ target pesticide spraying (7)_ rain poison on a whole field, which (8)_ include plants that don“t have the pest problem. Even better, Paley“s Remote Scanning Services Company could detect crop problem before they became (9)_ to the eye. Mounted on a plan

    4、e flown at 3,000 fee (10)_, an infrared scanner measured the heat emitted by crops. The data were (11)_ into a color-coded map showing (12)_ plants were running “fevers“. Farmers could then spot spray, using 50 to 70 percent less pesticide than they (13)_ would. The bad news is that Paley“s company

    5、closed down in 1984, after only three years. Farmers (14)_ the new technology and long-term backers were hard (15)_. But with the renewed concern about pesticides on produce, and refinements in infrared scanning, Paley hopes to (16)_ into operation. Agriculture experts have no doubt about the techno

    6、logy works. “This technique can be used (17)_ 75 percent of agricultural land in the United States“, says George Oerther of Texas AM. Ray Jackson, who recently retired from the Department of Agriculture, thinks (18)_ infrared crop scanning could be adopted by the end of the decade. But (19)_ Paley f

    7、inds the financial backing (20)_ he failed to obtain 10 years ago.(分数:40.00)A.asB.withC.likeD.unlikeA.takenB.takeC.tookD.takingA.adoptedB.adoptingC.adaptedD.adaptingA.put up withB.came up toC.came up withD.stood up toA.whoseB.whichC.whatD.whereA.preciselyB.extraordinarilyC.exceedinglyD.extremelyA.mo

    8、re thanB.less thanC.rather thanD.other thanA.dominantlyB.deliberatelyC.accidentallyD.invariablyA.seemingB.clearC.apparentD.visibleA.at nightB.for the nightC.in nightD.over nightA.transmittedB.transferredC.transformedD.transportedA.howB.whereC.whatD.whenA.otherwiseB.stillC.thusD.thereforeA.persisted

    9、inB.resistedC.insisted onD.assistedA.to find outB.to be foundC.to findD.to be found onA.get offB.get outC.get awayD.get backA.ofB.inC.forD.onA.remoteB.lonelyC.removedD.desolateA.even ifB.if onlyC.only ifD.thoughA.whereB.whichC.howD.when二、Reading Comprehensio(总题数:10,分数:58.00)2.Section II Reading Comp

    10、rehension_3.Part ADirections: Read the following four texts. Answer the questions below each text by choosing A, B, C or D._As Eleanor Roosevelt once said, “Universal human rights begin in small places, close to home“. And Tolerance.org, a Web site from the Southern Poverty Law Center, is helping pa

    11、rents across the country create homes in which tolerance and understanding are guiding themes. “The goal of nurturing open-minded, empathetic children is a challenging one“, says Jennifer Holladay, director of Tolerance. org. “To cultivate tolerance, parents have to instill in children a sense of em

    12、pathy, respect and responsibilityto oneself and to othersas well as the recognition that every person on earth is a treasure“. Holladay offers several ways parents can promote tolerance: Talk about tolerance. Tolerance education is an ongoing process; it cannot be captured in a single moment. Establ

    13、ish a high comfort level for open dialogue about social issues. Let children know that no subject is taboo. Identify intolerance when children are exposed to it. Point out stereotypes and cultural misinformation depicted in movies, TV shows, computer games and other media. Challenge bias when it com

    14、es from friends and family members. Do not let the moment pass. Begin with a qualified statement: “Andrew just called people of XYZ faith “lunatics“. What do you think about that, Zoe?“ Let children do most of the talking. Challenge intolerance when it comes from your children. When a child says or

    15、does something that reflects biases or embraces stereotypes, confront the child: “What makes that joke funny, Jerome?“ Guide the conversation toward internalization of empathy and respect“Mimi uses a walker, honey. How do you think she would feel about that joke?“ or “How did you feel when Robbie ma

    16、de fun of your glasses last week?“ Support your children when they are the victims of intolerance. Respect children“s troubles by acknowledging when they become targets of bias. Don“t minimize the experience. Provide emotional support and then brainstorm constructive responses. For example, develop

    17、a set of comebacks to use when children are the victims of name-calling. Create opportunities for children to interact with people who are different from them. Look critically at how a child defines “normal“. Expand the definition. Visit playgrounds where a variety of children are presentpeople of d

    18、ifferent races, socioeconomic backgrounds, family structures, etc. Encourage a child to spend time with eldersgrandparents, for example. Encourage children to call upon community resources. A child who is concerned about world hunger can volunteer at a local soup kitchen or homeless shelter. The ear

    19、lier children interact with the community, the better. This will help convey the lesson that we are not islands unto ourselves. Model the behavior you would like to see. As a parent and as your child“s primary role model, be consistent in how you treat others. Remember, you may say, “Do as I say, no

    20、t as I do“, but actions really do speak louder than words.(分数:10.00)(1).Which of the following statements is TRUE about Tolerance. org?(分数:2.00)A.It is a Web site from the Northern Poverty Law Center.B.It is helping parents across the country create homes for those orphans.C.The goal is to challenge

    21、 those intolerant children.D.It helps parents cultivate a sense of empathy and responsibility in their children.(2).The word “taboo“ (Para. 2) most probably means“_“.(分数:2.00)A.intoleranceB.forbidden customsC.secret dialoguesD.inappropriate issues(3).The example of asking “How did you feel when Robb

    22、ie made fun of your glasses last week?“ is to illustrate that it is indispensable to_.(分数:2.00)A.challenge intolerance when it comes from your childrenB.identify intolerance when children are exposed to itC.support your children when they are the victims of intoleranceD.create opportunities for chil

    23、dren to interact with people who are different from them(4).According to the passage, children are encouraged to join in many activities other than_.(分数:2.00)A.live in homeless shelterB.spend time with eldersC.volunteer at a local soup kitchenD.visit playgrounds where a variety of children are prese

    24、nt(5).According to Jennifer Holladay, who are children“s primary role models?(分数:2.00)A.Their teachers.B.Their parents.C.Their grandparents.D.Their peers.Every year New Zealanders living in London can be seen loading up Kombi vans and heading off to experience the “classic European holiday“. The tri

    25、p usually starts in the north of France, after crossing the channel from Dover in England to Calais, driving down through France, over the Pyrenees into Spain, west into Portugal and then across the Continent to Italy and often beyond. There are numerous reasons young New Zealanders take this rite o

    26、f passageas well as seeing all the fantastic sights and tasting the delights of Europe“s food and wine, it“s relatively inexpensive. The Kombi is transport and accommodation all in one, cutting down significantly on costs. There is just one problem. As the Kombis become “antique“, these trips are us

    27、ually punctuated with numerous roadside sessions as the van sits idle, in no hurry to start, while you swelter in the hot sun. But do not let this deter you. Travelling Europe in your own vehicle means no public transport schedules to cramp your style, the ability to explore the quaint, off-the-beat

    28、en-track villages where the “real“ locals live, freedom to not have to book accommodation in advanceyou can nearly always get a campsite and can load your vehicle with cheap, fantastic regional wines and souvenirs. With these bonuses in mind, here are some suggestions for planning the great Europe r

    29、oad adventure. The key to a pleasurable driving experience is a good navigator and a driver with a cool head. If you do not feel relaxed driving around New Zealand“s cities and highways, then you probably will not enjoy driving around Europe. As co-pilot to the driver, you need to read (and understa

    30、nd) maps, look out for turn-offsand keep the music playing. Language is not a big problem once a few essential terms are mastered. The biggest challenge is in the cities, where traffic can be chaotic and elaborate one-way systems and narrow, cobbled alleyways can make finding your destination hard w

    31、ork. It can be easier to leave the vehicle on the outskirts of town or in a camping ground and use public transport. This also avoids paying for costly parking.(分数:10.00)(1).According to the passage, the trip usually starts in_.(分数:2.00)A.FranceB.EnglandC.SpainD.Italy(2).The word “Kombi“ (Para. 1) m

    32、ost probably means “_“.(分数:2.00)A.the name of the tripB.the friend going with youC.the brand of the vanD.the name of a hotel(3).In the sentence “it“s relatively inexpensive“ (Para. 2) “it“ most probably refers to_.(分数:2.00)A.the tripB.the transportationC.the accommodationD.the food and wine(4).What

    33、is the biggest trouble?(分数:2.00)A.The Kombis become too old.B.Language.C.People may not enjoy the driving experience.D.Finding one“s destination is hard for the busy traffic in-cities.(5).What is the nationality of the target readers?(分数:2.00)A.New ZealandB.EnglandC.FranceD.SpainThe first big-name h

    34、ackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were

    35、designed to do. Back then, the word “hacker“ didn“t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead. The objectives of early hackers are a far cry from the goals of today“s hacker. The motivation of

    36、 the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today“s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Intern

    37、et. The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnera

    38、bilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilitiesphones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doe

    39、sn“t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more respon

    40、sibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at th

    41、e gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan ne

    42、twork for common backdoor servicesUse intrusion detection systems, vulnerability scans, anti virus protection.(分数:10.00)(1).Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?(分数:2.00)A.They are all good examples of today“s computer users.B.They are driven by g

    43、reed, power, revenge, or some other malicious intent.C.Their goal is to push programs beyond what they are designed to do.D.They are all dead.(2).The word “hacker“ (Para. 1) most probably means“_“.(分数:2.00)A.highly recognizable names behind many of the computer technologies used todayB.the negative

    44、connotation of those computer usersC.a game, employing the tools that are readily available via the InternetD.people who break into computer systems(3).Which of the following is NOT true of security attacks?(分数:2.00)A.Employees will keep Up with security polices and awareness if they are highly-trai

    45、ned.B.The rate of security attacks appears faster than the growth of the Internet.C.One“s computer system will never be secure.D.Vulnerabilities can go through phones, wireless devices, and network appliances.(4).What is the most important one among the realities listed?(分数:2.00)A.New vulnerabilitie

    46、s will be introduced into your environment every day.B.If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly Configuring firewalls and intrusion detection systems for their PCs.C.Managers have more responsibility t

    47、han ever.D.Security managers are asked to support increasing degrees of network availability and access.(5).Various security measures are recommended EXCEPT_.(分数:2.00)A.turning off network servicesB.employing a full-inspection firewallC.making sure that servers and applications are patchedD.eliminat

    48、ing all unneeded programsA recent history of the Chicago meat-packing industry and its workers examines how the industry grew from its appearance in the 1830“s through the early 1890“s. Meatpackers, the author argues, had good wages, working conditions, and prospects for advancement within the packinghouses, and did not cooperate with labor agitators since labor relations were so harmonious. Because the history maintains that conditions were above standard for the era, the frequency of labor disp


    注意事项

    本文(【考研类试卷】考研英语-试卷140及答案解析.doc)为本站会员(roleaisle130)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开