[外语类试卷]2008年财政部财政科学研究所考博英语真题试卷及答案与解析.doc
《[外语类试卷]2008年财政部财政科学研究所考博英语真题试卷及答案与解析.doc》由会员分享,可在线阅读,更多相关《[外语类试卷]2008年财政部财政科学研究所考博英语真题试卷及答案与解析.doc(25页珍藏版)》请在麦多课文档分享上搜索。
1、2008年财政部财政科学研究所考博英语真题试卷及答案与解析 一、 Cloze 0 The normal human daily cycle of activity is of some 7-8 hours sleep alternation with some 16-17 hours wakefulness and that the sleep normally coincides【 C1】_the hours of darkness. Our present concern is with how easily and to what extent this【 C2】 _can be mod
2、ified. The question is no mere academic one. The ease with which people can change from working in the day to working at night is a【 C3】 _of growing importance in industry where automation【 C4】 _round-the-clock working of machines. It normally【 C5】 _form five days to one week for a person to adapt t
3、o a【 C6】_routine of sleep and wakefulness, sleeping during the day and working at night【 C7】 _, it is often the case in industry that shifts are changed every week. This means mat no sooner has he got used to one routine【 C8】 _he has to change to another, 【 C9】 _much of his time is spent neither wor
4、king nor sleeping every 【 C10】 _, One answer would seem to be【 C11】 _periods on each shift, a month, or even three months. 【 C12】 _recent research has shown that people on such systems will revert to go back to their【 C13】 _habits to sleep and wakefulness during the week-end and that this is quite e
5、nough to destroy any【 C14】_to night work built up during the week. The only real solution appears to be to hand over the night shift to those permanent night workers whose【 C15】 _may persist through all week-ends and holidays. 1 【 C1】 ( A) in ( B) with ( C) of ( D) over 2 【 C2】 ( A) cycle ( B) perio
6、d ( C) circle ( D) round 3 【 C3】 ( A) problem ( B) difficulty ( C) trouble ( D) matter 4 【 C4】 ( A) asks ( B) invites ( C) calls for ( D) reacts to 5 【 C5】 ( A) takes ( B) spends ( C) demands ( D) asks 6 【 C6】 ( A) former ( B) returned ( C) reversed ( D) regular 7 【 C7】 ( A) Therefore ( B) Unfortuna
7、tely ( C) In a word ( D) In comparison 8 【 C8】 ( A) as ( B) when ( C) then ( D) than 9 【 C9】 ( A) though ( B) so that ( C) while ( D) as 10 【 C10】 ( A) efficiently ( B) good ( C) easily ( D) happily 11 【 C11】 ( A) shorter ( B) better ( C) longer ( D) nicer 12 【 C12】 ( A) So ( B) In short ( C) Simila
8、rly ( D) However 13 【 C13】 ( A) new ( B) normal ( C) temporary ( D) favorite 14 【 C14】 ( A) change ( B) return ( C) adaptation ( D) tendency 15 【 C15】 ( A) wakefulness ( B) sleep ( C) preference ( D) habit 二、 Reading Comprehension 15 New and bizarre crimes have come into being with the advent of com
9、puter technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage (破坏 ), politically related sabotage, vandalism, crimes against the individual and financially relat
10、ed crimes“Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapid
11、ly expanding criminal market Buyers for stolen programs may from a firms competitors to foreign nations. A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector.
12、 This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their record keeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquir
13、ing the firm can easily buy it at a substantially lower. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent.
14、Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered mor
15、e than $ 2 million in damages as a result of bombing. Computer vulnerability has been documented in great details. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingn
16、ess to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders Computers are used in hospital life-support system, in laboratories
17、, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large
18、urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century. The computer opens vast areas of crime to organized criminal groups, both nation and international. It calls on them to pool their resources and incr
19、ease their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not Many still think in terms of traditional criminology. 16 How many
20、 kinds of crimes are mentioned in the passage? ( A) 7 ( B) 8 ( C) 9 ( D) 10 17 What is the purpose of a competitor to sabotage a companys computer? ( A) His purpose is to destroy or weaken the firms operational ability. ( B) His purpose is to weaken firms competitive capability and get it ( C) His p
21、urpose is to buy the rivals company at a relatively low price. ( D) His purpose is to steal important data. 18 Which of the following can be labeled as a politically motivated sabotage of a computer system? ( A) Sabotage of a university computer. ( B) Sabotage of hospital computer. ( C) Sabotage of
22、computer at a secret training base. ( D) Sabotage of a factory computer. 19 What does the author mean by “Homicide could take a new form“ ? ( A) There is no need to use a gun in killing a person. ( B) Criminals can kill whoever they want by a computer. ( C) The computer can replace any weapons. ( D)
23、 The function of a computer is just like a gun. 20 What does the word “homicide“ possibly mean in Paragraph 5? ( A) Kill people at home ( B) Murdering ( C) Terrorist ( D) Crime 20 This month Singapore passed a bill that would give legal teeth to the moral obligation to support ones parents. Called t
24、he Maintenance of Parents Bill, it received the backing of the Singapore government. That does not mean it hasnt generated discussion. Several members of the Parliament opposed the measure as un-Asian. Other who acknowledged the problem of the elderly poor believed it a disproportionate response. St
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外语类 试卷 2008 财政部 财政 科学研究所 英语 答案 解析 DOC
