关键词不能为空

当前您在: 主页 > 高中公式大全 >

大快朵颐的意思:2018考研英语冲刺测试卷

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2020-12-01 06:25
tags:divided

渺渺兮予怀句式-火车票可以提前几天

2020年12月1日发(作者:巫凯)

Born to win

2018 考研英语(二)冲刺测试卷
试题
Section I Use of English
Directions: Read the following text. Choose the best word(s) for each numbered blank and
mark A, B, C or D on ANSWER SHEET . (10 points)

If sustainable competitive advantage depends on work force skills, American firms have a
problem. Human-resource management is not traditionally seen as __1__ to the competitive
survival of the firm in the United States. Labor is simply another factor of production to be hired
or __2__ at the lowest possible cost—much __3__one buys raw materials or equipment.
The lack of importance ___4___ to human resource management can be seen in the
corporation hierarchy. In an American firm the chief financial officer is almost always second
__5___ command. The __6__ of head of human- resource management is usually a specialized job,
off at the edge of the corporate hierarchy. The executive who ___7___ it is never consulted on
major strategic decisions and has no chance to ___8___ to Chief Executive Officer(CEO).
___9___, in Japan the head of human-resource management is central—usually the second most
important executive, after the CEO, in the firm's ___10___.
As a ___11___, problems ___12___ when new breakthrough technologies arrive. If
American workers, for example, take much longer to learn ___13___ to operate new flexible
manufacturing stations than workers on Germany (as they do), the effective cost of those stations
is ___14___ in Germany than it is in the United States. More time is required before equipment is
up and running at capacity, and the need for ___15___ retraining ___16___ costs and creates
bottlenecks that ___17___ the speed with ___18___ new equipment can be employed. The result
is a slower pace of technological ___19___. And in the end the skills of the bottom half of the
population ___20___ the wages of the top half. If the bottom half can't effectively staff the
processes that have to be operated, the management and professional jobs that go with these
processes will disappear.
1. [A] necessary [B] dispensable [C] central [D] understandable
2. [A] rented [B]acquired [C] required [D] got
3. [A] like [B] that [C] as [D] while
4. [A] compared [B] attached [C] detached [D] entitled
5. [A] in [B] on [C] through [D] by
6. [A] responsibility [B] personality [C] importance [D] post
7. [A] supervises [B] holds [C] manages [D] brings
8. [A] pick up [B] start up [C] put up [D] move up
9. [A] Furthermore [B] Similarly [C] Although [D] However
10. [A] hierarchy [B] post [C] position [D] management
11. [A] matter [B] fact [C] result [D] case
12. [A] invent [B] emerge [C] perform [D] expose
13. [A] how [B] what [C] where [D] whom
14. [A] fewer [B] higher [C] littler [D] lower
15. [A] extensive [B] intensive [C] excessive [D] decisive
16. [A] produces [B] generates [C] manufactures [D] grows
17. [A] promote [B] limit [C] confine [D] accelerate
18. [A] which [B] that [C] where [D] whom
19. [A] innovation [B] recession [C] progression [D] adaptation

Born to win

[B] lift [C] affect [D] balance 20. [A] raise


SectionⅡ Reading Comprehension
Part A
Directions: Read the following four texts. Answer the questions below each text by choosing
A, B, C or D. Mark your answers on ANSWER SHEET . (40 points)

Text 1
A divided Supreme Court ruled Monday that police may take DNA samples when booking
those arrested for serious crimes, narrowly upholding a Maryland law and opening the door to
more widespread collection of DNA by law enforcement.
The court ruled 5 to 4 that government has a legitimate interest in collecting DNA from
arrestees, just as it takes photographs and collects fingerprints. Rejecting the view that the practice
constitutes an unlawful search, the majority said it was justified to establish the identity of the
person in custody. “DNA identification represents an important advance in the techniques used by
law enforcement to serve legitimate police concerns for as long as there have been arrests,” Justice
Anthony M. Kennedy wrote for the majority.
The dissenters were three of the court’s liberals plus conservative Justice Antonin Scalia, who
amplified his displeasure by reading a summary of his dissent.“The court has cast aside a bedrock
rule of our Fourth Amendment law: that the government may not search its citizens for evidence
of crime unless there is a reasonable cause to believe that such evidence will be found,” In his
dissent, Scalia wrote that the majority’s attempts to justify the use of DNA as an identification tool
“taxes the naivety of the naive.” He added, “Make no mistake about it: As an entirely predictable
consequence of today’s decision, your DNA can be taken and entered into a national DNA
database if you are ever arrested, rightly or wrongly, and for whatever reason.”
Kennedy said Maryland’s law is more limited than that. He noted that DNA can be taken only
from those suspected of “serious” crime, that the sample is destroyed if the arrestee is not
convicted, and that the DNA tests did not violate the privacy of the person by revealing genetic
traits or medical information. Besides that, Kennedy said, DNA identification contains critical
clues about whether an arrestee should be eligible for being released on bail or whether he would
be likely to flee because he had committed a crime more serious than the one for which he was
arrested.
But Scalia said “Solving unsolved crimes is a noble objective, but it occupies a lower place in
the American noble objectives than the protection of our people from suspicionless
law-enforcement searches,” He concluded with a nod to the Framers of the Constitution: “I doubt
that the proud men who wrote the charter of our liberties would have been so eager to open their
mouths for royal inspection.”
The decision was evidence of how the court’s ideological differences blur on Fourth
Amendment cases. Earlier this term, Scalia joined Ginsburg, Sotomayor and Kagan to rule that

Born to win

bringing a police dog to a suspected drug dealer’s door without a warrant amounted to an unlawful
search. And Scalia joined Sotomayor’s broad ruling in another case that held police officers
generally must try to get a warrant before forcing uncooperative drunken-driving suspects to
submit to a blood test.

21. The majority of Supreme Court Justices hold that the collection of DNA samples from
arrestees_____.
A. overestimates the implications of techniques
B. provides an effective identification tool
C. serves the interest of the government
D. constitutes an illegal police search
22. According to Paragraph 3, Justice Antonin Scalia’s dissent is largely out of_____.
A. his strict adherence to the Fourth Amendment law
B. his concern over misjudgment and wrong arrests
C. his defense of a citizen’s privacy in law enforcement
D. his doubt about the reliability of DNA identification
23. To which of the following would Kennedy agree, according to Paragraph 4?
A. Maryland’s law about DNA collection has obvious limitations and needs to be improved.
B. DNA samples should be taken from for both serious crimes and minor offences.
C. DNA samples collected from arrestees should be entered into a national DNA database.
D. DNA identification provides critical information about the potential danger posed by an
arrestee.
24. By mentioning the Framers of the Constitution, Scalia intended to _____.
A. question the nobility of the judicial process of Maryland case
B. demonstrate the historic significance of Maryland case
C. denounce the court’s decision as against the protection of personal rights
D. illustrate the embarrassing DNA sample collection procedure
25. Which of the following is suggested in the last paragraph?
A. The court’s attitude on Fourth Amendment cases is increasingly apparent.
B. The justices usually split on decisions about the Fourth Amendment cases.
C. Scalia has an inconsistent attitude on the issue of law- enforcement searches.
D. The court sometimes goes against the Fourth Amendment deliberately.



Text 2
Being the first to do something matters. Being the first to tell other folks that you did it
matters too. For scientists, publication in a peer reviewed journal is the primary way of
communicating experimental results, so getting a manuscript through the review process and into
publication in a timely manner is important. This can get complicated if you are also trying to be
published in the most prestigious journal possible.
For example, a scientist could submit their manuscript to a prestigious journal like Nature or
Science. The article is sent out for review and within a few months the authors get a note back
saying that while their science was methodologically sound, it just wasn’t innovative enough for

Born to win

those journals. Next, the scientist submits it to the top journal in their field, only to be told in a few
months that it was too interdisciplinary for that journal. A scientist may go through several rounds
of submission and rejection looking for a suitable home for their manuscript, worrying as the
months slip by that someone else has beat them to the publication of similar results.
Enter the folks behind new “portable peer review” services. Traditionally, the review process
was done within the organizational structure of the journal you submitted your manuscript to.
These new services are independent of specific journals and their goal is to cut down on the
redundant work being done in the publication process. This separates the review process from the
publication process, and authors could take their reviews with them as they search for an
appropriate publication venue.
While the details vary widely, it is similar to traditional journal based peer review. An author
submits a manuscript, reviewers are located, and the reviewers provide commentary on the paper.
The portable peer review services have generally taken the time to develop detailed rubrics and
detailed guiding questions for reviewers. The authors can then revise their manuscripts and take
everything to a journal of their choice. The portable peer review services are also working hard to
cooperate with journal editors, allowing them to tell their authors that reviews from their service
will be welcomed at specific journals. Some journals have instituted policies accepting outside
peer review, starting to welcome manuscripts that have been rejected by higher impact journals.
Importantly, these services often mention the desire to develop a “reputation economy” for
reviewers. While many reviewers take the time to provide polite, constructive criticism of a
manuscript, there are others who may simply say “this sucks.” Knowing who is more likely to
provide the former ahead of time could be useful. For example, Peerage of Science offers a “peer
review of peer review” that rates reviewer reviews, and provides reviewer scores on reviewer
profiles.
Although scientists recognize that peer review has problems, most recognize that it serves a
valued role in communicating scientific research. New portable peer review services hope to
improve the quality of reviews while simultaneously reducing the amount of redundancy in the
publication system.

26. In the first two paragraphs, the author discusses_______.
A. the background information of journal editing
B. the significance of submitting manuscripts timely
C. the complicated route of getting published in prestigious journals
D. the redundant procedure followed in the traditional publication system
27. The portable peer review services emerge to help_______.
A. keep peer reviews independent and impartial
B. avoid repetition of scientific studies
C. speed up the publication process
D. curb the excessive publication
28. According to Paragraph 4, the new services can help authors_______.
A. better their manuscripts before submitting to journals
B. get a detailed revising guidelines from reviewers
C. learn review results from journal editors in advance
D. eliminate reviewers’ negative feelings toward once-rejected manuscripts

Born to win

29. Paragraph 5 indicates that “reputation economy” is developed to _______.
A. guarantee the quality of manuscripts
B. earn reviewers academic credit and huge profits
C. make the reviews polite and easily accepted by authors
D. improve reviewers’ conscientiousness in their reviews
30. What is the subject of the text?
A. Peer review still has a role to play.
B. Portable peer review is emerging.
C. The merits and problems of portable peer review.
D. Online publication: solver to the redundant publication system.

Text 3

The Internet has turned into a massive surveillance tool. We're constantly monitored,
sometimes by corporations wanting to sell us stuff and sometimes by governments wanting to
keep an eye on us. Momentary conversation is over. Wholesale surveillance is the norm.
It's about to get worse, though. The Internet of Things refers to a world where much more
than our computers and cell phones is Internet-enabled. Soon there will be Internet-connected
modules on our cars and home appliances. Internet-enabled medical devices will collect real-time
health data about us. In its extreme, everything can be connected to the Internet. It's true
that the of Thingswill make a lot of wonderful things possible, but it also
gives the governments and corporations that follow our every move something they don't yet
have: eyes and ears.
In the near term, the sheer volume of data will limit the sorts of conclusions that can be
drawn. The invasiveness of “Internet Things” new technologies depends on asking the right
questions. For example, if a private investigator is watching you in the physical world, she or he
might observe odd behavior and investigate further based on that. Such occasional observations
are harder to achieve when you're filtering databases based on pre- programmed queries. In other
words, it's easier to ask questions about what you purchased and where you were than to ask what
you did with your purchases and why you went where you did. These analytical limitations also
mean that companies like Google and Facebook will benefit more from the Internet of Things than
individuals -- not only because they have access to more data, but also because they have more
sophisticated query technology.
In the longer term, the Internet of Things means ubiquitous surveillance. If an object
you have purchased it, and communicates via either Wi-Fi or the mobile network, then whoever or
whatever it is communicating with will know where you are. Your car will know who is in it, who
is driving, and what traffic laws that driver is following or ignoring.

Fast food restaurants will
know what you usually order, and exactly how to entice you to order more.
Will you know any of this? It depends. Lots of these devices have, and will have, privacy
settings. But these settings are remarkable not in how much privacy they afford, but in how much
they deny. Access will likely be similar to your browsing habits, your searches on Google, and
your text messages from your phone. You'd think that your privacy settings would keep random
strangers from learning everything about you, but it only keeps random strangers who don't pay
for the privilege – or don't work for the government and have the ability to

Born to win

demand the data. Power is what matters here: you'll be able to keep the powerless from invading
your privacy, but you'll have no ability to prevent the powerful from doing it again and again.

31. The first two paragraphs mainly discuss______.
A. the uses of personal data collection
B. the beneficial aspects of surveillance
C. an emerging large- scale threat to privacy
D. an unknown side of governments and corporations
32. The example of the private investigator’s act is mentioned to highlight______.
A. the limitation of program- based queries
B. the significance of access to more data
C. the way technology companies collect data
D. the complexity of the Internet of Things world
33. The author implies that privacy settings_______.
A. can inform people of their being under surveillance
B. can protect people from being monitored
C. are helping companies collect personal data
D. are essential for the Internet of Things
34. The last paragraph implies that personal privacy_______.
A. will be accessible to the general public
B. will fall victim to the privileged
C. will be under effective protection
D. will be an exclusive right for high-tech elites
35. The author’s tone behind Internet of Things is one of______.
A. welcome
B. criticism
C. indifference
D. worry

Text 4
When a coalition of interest activists and web companies scuppered the
Hollywood-sponsored Stop Online Piracy Act (SOPA) last year, they warned Congress that future
attempts to push through legislation that threatened digital freedoms would be met with a similar
response. Now some of them are up in arms again, this time against the Cyber Intelligence Sharing
and Protection Act (CISPA). This is one of several bills designed to reinforce America’s
cyber-defences that were being discussed by the House of Representatives.
Whatever the outcome of the deliberations, the fuss surrounding CISPA is unlikely to die
down soon. Its fans, which include companies such as IBM and Intel, say the bill’s provisions will
help America defend itself against attempts by hackers to penetrate vital infrastructure and pinch
companies’ intellectual property. CISPA’s critics, which include the Electronic Frontier Foundation,
a digital-rights group, and Mozilla, the maker of the Firefox web browser, argue that it could
achieve that goal without ignoring privacy laws designed to prevent the government getting its

Born to win

hands on citizens’ private data without proper judicial oversight.
CISPA aims to encourage intelligence-sharing. Companies and spies often keep quiet about
cyber-threats because they fear that sharing the details many land them in legal hot water. But this
makes it harder both to hunt hackers, and to defend power grids and other infrastructure against
online assaults. The bill encourage both groups to be more forthcoming by offering them an
exemption from civil and criminal liability when gathering and sharing data about cyber-threats.
The trouble is that although its goal is laudable, the bill is vague about what sort of
information on cyber- threats can be shared. So in theory everything from e-mails to medical
records could end up being shipped to intelligence agencies, even if it is not needed. Harvey
Anderson of Mozilla says CISPA “creates a black hole” through which all kinds of data could be
sucked in by the government.
The bill does forbid the use by officials of personal information from medical records, tax
returns and a list of other documents. But its critics say it would be far better if companies had to
get rid of such data before sharing what is left. They also note that the broad legal protection
CISPA offers to firms could be abused by companies keen to cover up mishaps in their handling of
customer data. A more carefully worded legal remedy would stop that happening.
All this has exposed a rift in the internet world. Whereas Mozilla and other firms want CISPA
to be overhauled or scrapped, some web firms that helped sink SOPA seem ambivalent. Google
claims it has taken no formal position on the draft legislation and it “watching the process closely”.
But TechNet, an industry group whose members include the web giant and Facebook, has written
to the House Intelligence Committee expressing support for CISPA. If Google and other web
companies do have doubts about some of the bill’s provisions, now would be the time for them to
sound the alarm.

36. We learn from the first paragraph that SOPA has _______.
A incurred criticism
B. raised suspicion
C. received acclaim
D. aroused curiosity
37. It can be inferred from Paragraph 2 that the critics criticize CISPA for its _______.
A. obsession with cyber security
B. invasion of intellectual property
C. threat of privacy violation
D. lack of judicial oversight
38. Harvey Anderson holds that CISPA _________.
A. fails to clarify what kind of information can be shared
B. adds huge burden to intelligence agencies
C. facilitates the America’s cyber-defences by intelligence-sharing
D. helps the government get hands on personal data
39. According to Paragraph 5, the critics note that CISPA _______.
A. weakens government officials’ power
B. offers full data protection over access
C. lacks justifiable punishment for data misuse
D. stands all in favor of web companies

Born to win

40. The author’s attitude towards the standing of those web firms like Google is one of _______.
A. appreciation
B. understanding
C. indulgence
D. opposition

Part B
Directions:You are going to read a list of headings and a text about plagiarism in the academic
community. Choose the most suitable heading from the list A-F for each numbered paragraph
(41-45).The first and last paragraphs of the text are not numbered. There is one extra heading
which you do not need to use. Mark your answers on ANSWER SHEET l. (10 points)
[A] What to do as a student?
[B] Various definitions of plagiarism
[C] Ideas should always be sourced
[D] Ignorance can be forgiven
[E] Plagiarism is equivalent to theft
[F] The consequences of plagiarism

Scholars, writers and teachers in the modern academic community have strong feelings about
acknowledging the use of another person's ideas. In the English-speaking world, the term
plagiarism is used to label the practice of not giving credit for the source of one's ideas. Simply
stated, plagiarism is
ideas, or the expression of ideas of another.
41.______________________________.
The penalties for plagiarism vary from situation to situation. In many universities, the
punishment may range from failure in a particular course to expulsion from the university. In the
literary world, where writers are protected from plagiarism by international copyright laws, the
penalty may range from a small fine to imprisonment and a ruined career. Protection of scholars
and writers, through the copyright laws and through the social pressures of the academic and
literary communities, is a relatively recent concept. Such social pressures and copyright laws
require writers to give scrupulous attention to documentation of their sources.
42.______________________________.
Students, as inexperienced scholars themselves, must avoid various types of plagiarism by
being self- critical in their use of other scholars' ideas and by giving appropriate credit for the
source of borrowed ideas and words, otherwise dire consequences may occur. There are at least
three classifications of plagiarism as it is revealed in students' inexactness in identifying sources
properly.
They are plagiarism by accident, by ignorance, and by intention.
43.______________________________.
Plagiarism by accident, or oversight, sometimes is the result of the writer's inability to decide

Born to win

or remember where the idea came from. He may have read it long ago, heard it in a lecture since
forgotten, or acquired it second-hand or third-hand from discussions with colleagues. He may also
have difficulty in deciding whether the idea is such common knowledge that no reference to the
original source is needed. Although this type of plagiarism must be guarded against, it is the least
serious and, if lessons learned, can be exempt from being severely punished.
44.______________________________.
Plagiarism through ignorance is simply a way of saying that inexperienced writers often do not
know how or when to acknowledge their sources. The techniques for documentation-note-taking,
quoting, footnoting, listing bibliography — are easily learned and can prevent the writer from
making unknowing mistakes or omissions in his references. Although 'there is no copyright in
news, or in ideas, only in the expression of them,the writer cannot plead ignorance when his
sources for ideas are challenged.
45.______________________________.
The most serious kind of academic thievery is plagiarism by intention. The writer, limited by
his laziness and dullness, copies the thoughts and language of others and claims them for his own.
He not only steals, he tries to deceive the reader into believing the ideas are original. Such words
as immoral, dishonest, offensive, and despicable are used to describe the practice of plagiarism by
intention.
The opposite of plagiarism is acknowledgement. All mature and trustworthy writers make use
of the ideas of others but they are careful to acknowledge their indebtedness to their sources.
Students, as developing scholars, writers, teachers, and professional leaders, should recognize and
assume their responsibility to document all sources from which language and thoughts are
borrowed. Other members of the profession will not only respect the scholarship, they will admire
the humility and honesty.

Section III Translation
46. Directions:
Translate the following text into Chinese. Write your translation on ANSWER SHEET. (15
points)

Employers are more likely to hire people they fancy, researchers claim, as they find
pursuits, background and self- presentation
workplace have fought a long battle to prove their skills, experience and CV are the only
keys to their success. But their efforts may have been in vain, as a study find good looks, a
winning smile may be the key to securing a job after all.
Bosses would rather hire someone they find attractive and enjoy spending time with than the
perfectly- qualified candidate, it has been claimed. They would rather employ someone “who will
be their friend or maybe even their romantic partner”, with whom they feel a “spark”, researchers
have suggested. A study, conducted by American sociologists, has found interviewers at banking,
law and management consultancy firms consistently prefer applicants they “feel good around”.


Born to win


Section III Writing

Part A
ions:
Write a letter to your university canteen, making suggestions for improving its service.
You should write about 100 words on ANSWER SHEET .
Do not sign your name at the end of the letter. Use “Li Ming” instead.
Do not write the address. (10 points)
Part B
48. Directions:
Write your essay on ANSWER SHEET. (15 points)
You should
1)interpret the chart, and
2)give your comments.
You should write about 150 words on the ANSWER SHEET. (15points)







Born to win

四大名著及作者-定情信物送什么


如何学好英语语法-最美歌词


工程造价是什么-服装招聘


基因检测多少钱-违纪


测控专业就业方向-边走边唱


王熙凤性格特点-潮汕文化


高中毕业赠言-天津农学院分数线


豆瓣读书网-舟山嵊泗列岛



本文更新与2020-12-01 06:25,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/475221.html

2018考研英语冲刺测试卷的相关文章