【考研类试卷】考研英语(二)-22 (1)及答案解析.doc
《【考研类试卷】考研英语(二)-22 (1)及答案解析.doc》由会员分享,可在线阅读,更多相关《【考研类试卷】考研英语(二)-22 (1)及答案解析.doc(29页珍藏版)》请在麦多课文档分享上搜索。
1、考研英语(二)-22 (1)及答案解析(总分:100.00,做题时间:90 分钟)一、Section Use of Eng(总题数:1,分数:10.00)At work, as in life, attractive women get a lot of good lucks. Studies have shown that they are more likely to be 1 than their plain-Jane colleagues because people tend to project 2 traits 3 them, such as a sensitive heart
2、and a cool head, they may also be at a/an 4 in job interviews. But research suggests otherwise. Brad Hanks at Georgia State University looked at what happens when job hunters include photos with their resume, as is the 5 in much of Europe and Asia. The pair sent made-up applications to over 2,500 re
3、al-life 6 . For each job, they sent two very similar resume, one with a photo, one without. Subjects had previously been graded for their attractiveness. For men, the results were 7 expected. Hunks were more likely to be called for an interview if they included a photo. Ugly men were better off not
4、including one. However, for women this was 8 Attractive females were less likely to be offered an interview if they included a mugshot. When applying directly to a company (rather than through an agency) an attractive woman would need to send out 11 CVs on average 9 getting an interview; a/an 10 qua
5、lified plain one just seven. At first, Mr. Hanks considered 11 he calls the “dumb-blonde hypothesis“that people 12 beautiful women to be stupid. 13 , the photos had also been rated on how 14 people thought each subject looked; there was no 15 between perceived intellect and beauty. So the cause of t
6、he discrimination must 16 elsewhere. Human resources departments tend to be 17 mostly by women. Indeed, in the Israeli study, 93% of those tasked with selecting whom to invite for an interview were female. The researchers“ unavoidableand unpalatableconclusion is that old-fashioned 18 led the women t
7、o discriminate 19 pretty candidates. So should attractive women simply attach photos that make them look dowdy? No. Better, says Mr. Hanks, to discourage the practice of including a photo altogether. Companies might even consider the 20 model used in the Belgian public sector, where CVs do not even
8、include the candidate“s name.(分数:10.00)A.recruitedB.offendedC.promotedD.flatteredA.possibleB.peculiarC.perfectD.positiveA.withB.toC.inD.onA.advantageB.benefitC.favorD.edgeA.standardB.normC.criterionD.exampleA.placesB.sitesC.vacanciesD.spacesA.asB.belowC.beyondD.aboveA.diversifiedB.conversedC.reverse
9、dD.reservedA.unlessB.beforeC.whileD.whenA.suitablyB.fullyC.equallyD.ideallyA.whatB.asC.whichD.thatA.assertB.defineC.judgeD.assumeA.ThereforeB.HoweverC.AdditionallyD.ConsequentlyA.intellectualB.intelligentC.intellectD.intelligibleA.conflictB.overlapC.correlationD.allianceA.locateB.relyC.lieD.layA.sta
10、ffedB.occupiedC.populatedD.inhabitedA.admirationB.jealousyC.prejudiceD.stereotypeA.aboutB.againstC.withD.forA.analogousB.unanimousC.anonymousD.anecdotal二、Section Reading Co(总题数:0,分数:0.00)三、Part A(总题数:0,分数:0.00)四、Text 1(总题数:1,分数:10.00)Last week 8,400 British students about to enter university receive
11、d an e-mail from the Student Loans Company (SLC), a government body, reminding them to complete their application forms. It came with an attachment that listed all 8,400 e-mail addresses. The outfit later issued a sheepish apology and promised an “internal investigation“. At best, such data breaches
12、 make a small dent in a firm“s reputation and the whole thing blows over, as it did SLC“s case; at worst, though, companies lose the trust of their customers and also have to pay large frees. Sony, an ailing Japanese electronics giant, may never quite recover from breach last year, when hackers stol
13、e the personal details of over 100m customers. The explosion of data in recent years was always going to make data breaches more common, as two recent reports make clear. The first is an annual publication commissioned by Symantec, a maker of security software, and carried out by the Ponemon Institu
14、te, a data-protection researcher, to look into the cost of data breaches in several countries. Now in its seventh year, the report had some good news for Americans. Calculating the costs of investigations, compensation, customer support and projected loss of revenue, it found that the average cost t
15、o a company per breached record declined for the first time since the numbers are tracked. The figure dropped from $214 in 2010 to $194 in 2011, suggesting that companies had become better both at preventing and responding to breaches. Europeans fared less well. The cost rose from 71 to 79 ($113 to
16、$126) in Britain, from 98 to 122 ($130 to $162) in France and from 138 to 146 in privacy-conscious Germany. In all four countries, around two-thirds of all breaches were the result of technical faults and malicious attacks. But the remaining third was down to negligence. They could, in other words,
17、never have happened. The second study goes some way to explaining why they did. Iron Mountain, a data-management company, commissioned PricewaterhouseCoopers, a consultancy, to assess the risk of information loss faced by mid-size European companies based on their attitudes to managing data. The rep
18、ort looks at 600 businesses in six European countries across different sectors. It found that businesses tend to regard data protection issues as the responsibility of IT departments. More than haft thought that technology can solve the problem. Only 1% of the businesses surveyed believed it concern
19、ed all employeesand thus required a change in behavior. Both reports conclude that is precisely what is needed. Symantec“s study found a correlation between having a senior executive in charge of information security and lower costs of data breaches. “It has to start at the top,“ says Marc Duale, Ir
20、on Mountain“s head. The best solution need not be the most expensiveemployee-awareness programs and staff training can be more effective than pricey IT upgrades. Malicious attacks may be unavoidable but silly mistakes are unforgivable.(分数:10.00)(1).According to Paragraph 1, the Student Loan Company
21、_.(分数:2.00)A.was attacked by hackers maliciously just like SonyB.responded to the data disclosure in a more diplomatic way than SonyC.recovered more quickly from the data disclosure scandal than SonyD.incurred heavier financial losses from data breach case than Sony(2).The first report probes into t
22、he problem of data breach by _.(分数:2.00)A.calculating the capital that companies pour into preventing data breachB.assessing the risk of information loss faced by different companiesC.identifying the factors that contribute to data breachD.computing the loss and expenditure arising from data breach(
23、3).Which of the following statements is true according to the first report?(分数:2.00)A.The problem of data breach in America is less severe than that in three European countries.B.The majority of data breaches in America are caused by uncontrollable factors.C.America spends more in preventing data br
24、each than its European counterparts.D.America made progress in data protection while its European counterparts went backward.(4).According to the second report, the occurrence of those data breach cases which should be avoided is a result of _.(分数:2.00)A.an underestimation of the risk of information
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 考研 试卷 英语 221 答案 解析 DOC
