【考研类试卷】厦门大学真题2007年及答案解析.doc
《【考研类试卷】厦门大学真题2007年及答案解析.doc》由会员分享,可在线阅读,更多相关《【考研类试卷】厦门大学真题2007年及答案解析.doc(39页珍藏版)》请在麦多课文档分享上搜索。
1、厦门大学真题 2007 年及答案解析(总分:100.00,做题时间:90 分钟)一、 Reading Comprehens(总题数:0,分数:0.00)二、Part A(总题数:3,分数:30.00)For the longest time, I couldnt get worked up about privacy: my right to it; how its dying; how were headed for an even more wired, underregulated, overintrusive, privacy-deprived planet.I should also
2、 point out that as news director for Pathfinder, Time Inc.s mega info mall, and a guy who on the Web, I know better than most people that were hurtling toward an even more intrusive world. Were all being watched by computers whenever we visit Websites; by the mere act of “browsing“ (it sounds so pas
3、sive!) were going public in a way that was unimaginable a decade ago.I know this because Im a watcher too. When people come to my Website, without ever knowing their names, I can peer over their shoulders, recording what they look at, timing how long they stay on a particular page, following them ar
4、ound Pathfinders sprawling offerings.None of this would bother me in the least, I suspect, if a few years ago, my phone,.like Marleys ghost, hadnt given me a glimpse of the nightmares to come. On Thanksgiving weekend in 1995, someone (presumably a critic of a book my wife and I had just written abou
5、t computer hackers) forwarded my home telephone number to an out-of-state answering machine, where unsuspecting callers trying to reach me heard a male voice identify himself as me and say some extremely rude things.Then, with typical hacker aplomb, the prankster asked people to leave their messages
6、 (which to my surprise many callers, including my mother, did). This went on for several days until my wife and I figured out that something was wrong (“Hey.why hasnt the phone rung since Wednesday?“) and got our phone service restored.It seemed funny at first, and it gave us a swell story to tell o
7、n our book tour. But the interloper who seized our telephone line continued to hit us even after the tour ended. And hit us again and again for the next six months. The phone company seemed powerless. Its security folks moved us to one unlisted number after another, half a dozen times. They put spec
8、ial pin codes in place. They put traces on the line. But the troublemaker kept breaking through.If our hacker had been truly evil and omnipotent as only fictional movie hackers are, there would probably have been even worse ways he could have threatened my privacy. He could have sabotaged my credit
9、rating. He could have eavesdropped on my telephone conversations or siphoned off my e-mail. He could have called in my mortgage, discontinued my health insurance or obliterated my Social Security number. Like Sandra Bullock in The Net, I could have been a digital untouchable, wandering the planet wi
10、thout a connection to the rest of humanity. (Although if I didnt have to pay back school loans, it might be worth it. Just a thought.)Still, I remember feeling violated at the time and as powerless as a minnow in a flash flood. Someone was invading my private space-my familys private space-and there
11、 was nothing I or the authorities could do. It was as close to a technological epiphany as I have ever been. And as I watched my personal digital hell unfold, it struck me that our privacy- mine and yours- has already disappeared, not in one Big Brotherly blitzkrieg but in Little Brotherly moments,
12、bit by bit.Losing control of your telephone, of course, is the least of it. After all, most of us voluntarily give out our phone number and address when we allow ourselves to be listed in the White Pages. Most of us go a lot further than that. We register our whereabouts whenever we put a bank card
13、in an ATM machine or drive through an E-Z Pass lane on the highway. We submit to being photographed every day-20 times a day on average if you live or work in New York City-by surveillance cameras. We make public our interests and our purchasing habits every time we shop by mail order or visit a com
14、mercial Website.(分数:10.00)(1).What information do you learn about the author that establishes him as an authority on this topic?A. He has suffered a lot in losing his privacy.B. He makes his living off of the Web.C. He knows how to monitor his account.D. He and his wife published a book concerning c
15、omputer hackers.(分数:2.00)A.B.C.D.(2).Which of the following problems has the author experienced?A. Someone got information from his medical files and sent him brochures on health products he may want to buy.B. Someone used the motor-vehicle registration records on his car to find his home address.C.
16、 Someone rerouted his telephone calls to another number without his knowledge.D. Someone sent an e-mail message that destroyed the files on his computer.(分数:2.00)A.B.C.D.(3).According to the passage, the hackers in the movie would conduct following thing EXCEPT_A. eavesdroppingB. damaging a Social S
17、ecurity numberC. threatening in a flash floodD. making a person information disappear in the date base(分数:2.00)A.B.C.D.(4).The writer cited his experience to show that_A. the authorized organization could solve the problem by offering timely helpB. the interloper would be kept back sooner or laterC.
18、 the government took personal privacy bit by bitD. he would lose his privacy gradually(分数:2.00)A.B.C.D.(5).Because of advances in todays technology, the right to privacy could be compromised in the following areas EXCEPT_A. purchasing B. banking C. telephone use D. recruitment(分数:2.00)A.B.C.D.Hello,
19、 my name is Richard and I am an ego surfer. The habit began about five years ago, and now I need help. Like most journalists, I cant deny that one of my private joys is seeing my byline in print. Now the Intemet is allowing me to feed this vanity to an ever greater extent, and the occasional sneaky
20、web search has grown into a full-blown obsession with how high up Googles ranking my articles appear when I put my name into the search box. When I last looked, my best effort was a rather humiliating 47th place. You know you have a problem when you find yourself competing for ranking with a retired
21、 basketball player from the 1970s.Not that Im alone in suffering from a disfunctional techno-habit. New technologies have revealed a whole raft of hitherto unsuspected personality problems: think crackberry, powerpointlessness or cheesepodding. Most of us are familiar with sending an email to a coll
22、eague sitting a couple of feet away instead of talking to them. Some go onto the web to snoop on old friends, colleagues or even first dates. More of us than ever reveal highly personal information on blogs or My Space entries. A few will even use Intemet anonymity to fool others into believing they
23、 are someone else altogether. So are these web syndromes and technological tics new versions of old afflictions, or are we developing fresh mind bugs?Developing a bad habit is easier than many might think. “You can become addicted to potentially anything you do,“ says Mark Griffiths, an addiction re
24、searcher at Nottingham Trent University in the UK, “because addictions rely on constant rewards.“ Indeed, although definitions of addiction vary, there is a body of evidence that suggests drug addictions and non-drug habits share the same neural pathways. While only a hardcore few can be considered
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 考研 试卷 厦门大学 2007 答案 解析 DOC
