【考研类试卷】考研数学二-矩阵的特征值和特征向量、二次型(二)及答案解析.doc
《【考研类试卷】考研数学二-矩阵的特征值和特征向量、二次型(二)及答案解析.doc》由会员分享,可在线阅读,更多相关《【考研类试卷】考研数学二-矩阵的特征值和特征向量、二次型(二)及答案解析.doc(29页珍藏版)》请在麦多课文档分享上搜索。
1、考研数学二-矩阵的特征值和特征向量、二次型(二)及答案解析(总分:100.00,做题时间:90 分钟)一、Section Use of Eng(总题数:1,分数:10.00)What do you think of American health care system? Most people would be (1) by the high quality of medicine (2) to most Americans. There is a lot of specialization, a great deal of (3) to the individual, a (4) amou
2、nt of advanced technical equipment, and (5) effort not to make mistakes because of the financial risk which doctors and hospitals must (6) in the courts if they (7) things badly.But the Americans are in a mess. To the problem is the way in (8) health care is organized and (9) . (10) to pubic belief
3、it is not just a free competition system. To the private system has been joined a large public system, because private care was simply not (11) the less fortunate and the elderly.But even with this huge public part of the system, (12) this year will eat up 84.5 billion dollarsmore than 10 percent of
4、 the U. S. Budgeta large number of Americans are left (13) . These include about half the 11 million unemployed and those who fail to meet the strict limits (14) income fixed by a government trying to make savings where it can.The basic problem, however, is that there is no central control (15) the
5、health system. There is no (16) to what doctors and hospitals charge for their services, other than what the public is able to pay. The number of doctors has shot up and prices have climbed. When faced with toothache, a sick child, or a heart attack, all the unfortunate persons concerned can do is t
6、o pay (17) . Two thirds of the population are (18) by medical insurance. Doctors charge as much as they want (19) that the insurance company will pay the bill.The rising cost of medicine in the U. S. A. is among the most worrying problems facing the country. In 1981 the countrys health bill climbed
7、15.9 percentabout twice as fast as prices (20) general.(分数:10.00)(1).A compressed B impressed C obsessed D repressed(分数:0.50)A.B.C.D.(2).A available B attainable C achievable D amenable(分数:0.50)A.B.C.D.(3).A extension B retention C attention D exertion(分数:0.50)A.B.C.D.(4).A countless B titanic C bro
8、ad D vast(分数:0.50)A.B.C.D.(5).A intensive B absorbed C intense D concentrated(分数:0.50)A.B.C.D.(6).A run into B encounter C face D defy(分数:0.50)A.B.C.D.(7).A treat B deal C maneuver D handle(分数:0.50)A.B.C.D.(8).A which B that C what D when(分数:0.50)A.B.C.D.(9).A helped B financed C planned D controlle
9、d(分数:0.50)A.B.C.D.(10).A Contrary B Opposed C Averse D Objected(分数:0.50)A.B.C.D.(11).A looking for B looking into C looking after D looking over(分数:0.50)A.B.C.D.(12).A which B what C that D it(分数:0.50)A.B.C.D.(13).A over B out C off D away(分数:0.50)A.B.C.D.(14).A for B in C with D on(分数:0.50)A.B.C.D.
10、(15).A over B on C under D behind(分数:0.50)A.B.C.D.(16).A boundary B restriction C confinement D limit(分数:0.50)A.B.C.D.(17).A out B for C up D off(分数:0.50)A.B.C.D.(18).A discovered B covered C recovered D ranged(分数:0.50)A.B.C.D.(19).A knowing B to know C they know D known(分数:0.50)A.B.C.D.(20).A on B
11、with C in D for(分数:0.50)A.B.C.D.二、Section Reading Co(总题数:0,分数:0.00)三、Part A(总题数:0,分数:0.00)四、Text 1(总题数:1,分数:10.00)Data security used to be all about spending big bucks on firewalls to defend data at the network perimeter and on antivirus software to protect individual computers. Internet-based compu
12、ting, or cloud computing, has changed all that, at the same time expanding exponentially the chances for data thieves and hackers. The cloud creates other opportunities too. a handful of security vendors now deliver security as a service-a one-two punch of hardware and software that monitors and man
13、ages an enterprises data security and bills customers only for the computing power they use. “For years, security was about big companies pushing technology to their customers,“ says Qualys CEO and founder Philippe Courtot. “Now its about the customers pulling precisely what they need and providing
14、them with those resources on demand. “ Qualys, a privately held company in Redwood Shores, Calif. , was among the first to embrace the service-oriented model, in 1999. Today four different modules of QualysGuard, its flagship offering, are used by more than 3500 organizations in 85 countries. The co
15、mpany performs more than 200 million security audits per year. Courtot knows something about opportunity. The French entrepreneur arrived in Silicon Valley in 1987 and has built a number of companies into big-time players, including Signio, an electronic-payment start-up that was eventually sold to
16、VeriSign in a combined deal for more than $1 billion. As CEO, he rebuilt Verity and transformed cc:Mail, a once unknown firm of 12 people, into a dominant e-mail platform before Lotus acquired it in 1991. “Throughout my career, Ive been able to recognize that for a technology to succeed, it must hav
17、e a purpose,“ he says. “Technology itself has no value. Its what you do with it that counts. “ Under the old paradigm, according to Courtot, enterprises overspent for stand-alone security devices that became unruly and difficult to operate over the long term He says Qualys attacks the flaws in this
18、strategy by streamlining security and tackling most of the service delivery through the cloud. “We control the infrastructure, software updates, quality assurance and just about everything in between,“ he says. The firm unveiled QualysGuard in 2000. After an infusion of $ 25 million from the venture
19、 firm Trident Capital and another $ 25 million from Gourtot, Qualys tweaked the service to focus mostly on vulnerability management. Much of the companys current revenue-sales, topped $ 50 million last year-is being driving by a set of standards established by the Payment Card Industry Security Stan
20、dards Council (PCISSC). “The PCI standard has been a major driver of business for all of them, especially Qualys,“ says Avivah Litan, a vice president and analyst at market-research firm Gartner. “When everyone has to comply, theres a lot of work to go around. /(分数:10.00)(1).The traditional way to e
21、nsure data security is by _. A applying for cloud computing B installing firewalls and antivirus programs C decreasing the chances for hackers D using a handful of hardwares and softwares(分数:2.00)A.B.C.D.(2).The phrase “one-two punch“ (Line 2, Paragraph 2) is closest in meaning to _. A fight B negat
22、ive effect C small size D combination(分数:2.00)A.B.C.D.(3).Whats Courtots contribution to cc:Mail? A He transformed co Mail into a dominant e-mail platform. B He tackled most of the service delivery through the cloud. C He pushed technology to their customers. D He invested a lot of money to ensure c
23、ustomers security.(分数:2.00)A.B.C.D.(4).According to the text, which one about Qualys is TRUE? A It is a state-owned business company. B It is the first company that supports service-oriented model. C It can streamline security and tackle most of service delivery. D It doesnt focus mostly on vulnerab
24、ility management.(分数:2.00)A.B.C.D.(5).The authors attitude towards the PCI standard is A supportive B critical C opposed D nonchalant(分数:2.00)A.B.C.D.五、Text 2(总题数:1,分数:10.00)If there is one thing scientists have to hear, it is that the game is over. Raised on the belief of an endless voyage of disco
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 考研 试卷 数学 矩阵 特征值 特征向量 二次 答案 解析 DOC
