厦门大学2007博士研究生入学考试英语试题.doc
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《厦门大学2007博士研究生入学考试英语试题.doc》由会员分享,可在线阅读,更多相关《厦门大学2007博士研究生入学考试英语试题.doc(21页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、【精品文档】如有侵权,请联系网站删除,仅供学习与交流厦门大学2007博士研究生入学考试英语试题.精品文档.厦门大学2007博士研究生入学考试英语试题厦门大学2007博士研究生入学考试英语试题Part I Reading Comprehension(40 points)Part A(30 points)Directions: There are 3 reading passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there ar
2、e four choices marked A,B,C and D. You should decide on the best choice and mark the corresponding letter on the ANSWER SHEET with a single line through the centerPassage OneQuestions 15 are based on the following passage:For the longest time, I couldnt get worked up about privacy: my right to it;ho
3、w its dying;how were headed for an even more wired,underregulated,overinstrusive,privacy-deprived planetI should also point out that as news director for Pathfinder,Time Incs mega info mall,and a guy who makes his living on the Web, I know better than most people that were hurtling toward an even mo
4、re intrusive world. Were all being watched by computers whenever we visit Websites;by the mere act of“browsing”(it sounds so passive!)weregoing public in a way that was unimaginable a decade agoI know this because Im a watcher tooWhen people come to my Website,without ever knowing their names, I can
5、 peer over their shoulders,recording what they look at, timing how long they stay on a particular page,following them around Pathfinders sprawling offeringsNone of this would bother me in the least,I suspect,if a few years ago,my phone, like Marleys ghost, hadnt given me a glimpse of the nightmares
6、to comeOn Thanksgiving weekend in 1995, someone(presumably a critic of a book my wife and I had just written about computer hackers)forwarded my home telephone number to an out-of-state answering machine where unsuspecting callers trying to reach me heard a male voice identify himself as me and say
7、some extremely rude thingsThen,with typical hacker aplomb, the prankster asked people to leave their messages(which to my surprise many Callers, including my mother,did)This went on for several days until my wife and I figured out that something was wrong (“Heywhy hasnt the phone rung since Wednesda
8、y?”)and got our phone service restoredIt seemed funny at first,and it gave us a swell story to tell on our book tour. But the interloper who seized our telephone line continued to hit us even after the tour ended. And hit us again and again for the next six months:The phone company seemed powerless.
9、 Its security folks moved us to one unlisted number after another half a dozen timesThey put special pin codes in placeThey put traces on the lineBut the troublemaker kept breaking throughIf our hacker had been truly evil and omnipotent as only fictional movie hackers are, there would probably have
10、been even worse ways he could have threatened my privacy. He could have sabotaged my credit ratingHe could have eavesdropped on my telephone conversations or siphoned off my e-mailHe could have called in my mortgage,discontinued my health insurance or obliterated my Social Security numberLike Sandra
11、 Bullock in the Net, I could have been a digital untouchable, wandering the planet without a connection to the rest of humanity(Although if I didnt have to pay back school loans,it might be worth itJust a thought。)Still, I remember feeling violated at the time and as powerless as a minnow in a flash
12、 floodSomeone was invading my private space-my familys private space-and there was nothing I or the authorities could doIt was as close to a technological epiphany as I have ever beenAnd as 1 watched my personal digital hell unfold,it struck me that our privacy-mine and yourshas already disappeared,
13、 not in one Big Brotherly blitzkrieg but in Little Brotherly moments,bit by bit.Losing control of your telephone, of course, is the least of it. After allmost of us voluntarily give out our phone number and address when we allow ourselves to be listed in the White PagesMost of us go a lot further th
14、an thatWe register our whereabouts when-ever We put a bank card in an ATM machine or drive through an E-Z Pass lane on the highwayWe submit to being photographed every day-20 times a day on average if you live or work in New York City-by surveillance camerasWe make public our interests and our purch
15、asing habits every time we shop by mail order or visit a commercial Website.1What information do you learn about the author that establishes him as an authority on this topic?AHe has suffered a lot in losing his privacyBHe makes his living off of the WebCHe knows how to monitor his accountD.He and h
16、is wife published a book concerning computer hackers.2.Which of the following problems has the author experienced?A. Someone got information from his medical files and sent him brochures on health products he may want to buy.B.Someone used the motor-vehicle registration records on his car to find hi
17、s home address.C.Someone rerouted his telephone calls to another number without his knowledge.D.Someone sent an e-mail message that destroyed the files on his computer.3.According to the passage, the hackers in the movie would conduct following thing EXCEPTA.eavesdroppingB.darnaging a Social Securit
18、y numberC.threatening in a flash floodD.making a person information disappear in the date base.4.The writer cited his experience to show that _A.the authorized organization could solve the problem by offering timely helpB.the interloper would be kept back sooner or laterC.the government took persona
19、l privacy bit by bitD.he would lose his privacy gradually5.Because of advances in todays technology, the right to privacy could be comprormised in the following areas EXCEPT _A.purchasingB.baningC.telephone useD.recruitmentPassage TwoQuestions 610 are based on the following passage:Hello, my name is
20、 Richard and I am an ego surfer. The habit began about five years ago, and now I need help. Like most journalists, I cant deny that one of my private joys is seeing my byline in print. Now the internet is allowing me to feed this vanity to an ever greater extent, and the occasional sneaky web search
21、 has grown into a full-blown obsession with how high up Googles ranking my articles appear when I put my name into the search box. When I last looked, my best effort was a rather humiliating 47th place. You know you have a problem when you find yourself competing for ranking with a retired basketbal
22、l player from the 1970s.Not that Im alone in suffering from a dysfunctional techno-habit. New technologies have revealed a whole raft of hitherto unsuspected personality problems., think crackberry, powerpointlessness or cheesepodding. Most of us are familiar with sending an e-mail to a colleague si
23、tting a couple of feet away instead of talking to them. Some go onto the web to snoop on old friends, colleagues or even first dates. More of us than ever reveal highly personal information on blogs or My Space entries. A few will even use internet anonymity to fool others into believing they are so
24、meone else altogether. So are these web syndromes and technological tics new versions of old afflictions, or are we developing fresh mind bugs?Developing a bad habit is easier than many might think. “You can become addicted to potentially anything you do,” says Mark Griffiths, an addiction researche
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 厦门大学 2007 博士研究生 入学考试 英语试题
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内