研究生类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
专业课
公共课
专业课
全国联考
同等学历申硕考试
博士研究生考试
外语专业综合
农学
法学
工学
军事学
地质学
教育学
力学
环境科学与工程
车辆工程
交通运输工程
电子科学与技术
信息与通信工程
控制科学与工程
哲学
政治学
数学
物理
动力工程及工程热物理
矿业工程
安全科学与工程
化学
材料科学与工程
冶金工程
马克思主义理论
机械工程
生物学
药学
心理学
计算机科学
历史学
西医
中医学
经济学
统计学
外语专业综合
新闻传播学
社会学
医学
语言文学
艺术学
管理学
公共卫生与预防医学
英语
日语
法语
德语
英语
俄语
阅读理解Passage 1 Poland, once a backward agricultural country, is quickly becoming an economic powerhouse in Central Europe
进入题库练习
阅读理解Passage 4 A good modern newspaper is an extraordinary piece of reading
进入题库练习
阅读理解Passage 2 Mind over matter is an English saying meaning that we can control our bodies with our minds
进入题库练习
阅读理解In the United States, it is not customary to telephone someone very early in the morning
进入题库练习
阅读理解Passage A Hot boning is an energy saving technique for the processing industry
进入题库练习
阅读理解I made a mental note that they were infertile
进入题库练习
阅读理解Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice and write down your answer on the Answer Sheet.Passage 1A variety of simple techniques can prevent computer crime, but more sophisticated methods are also necessary to prevent computer crimes.One technique to protect confidentiality is encryption(加密). Information can be scrambled and unscrambled using mathematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.Another technique to prevent computer crime is to limit access of computer data files to approved users. Access- control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical token password generated by the computer and the user’s password, which is stored on a confidential list. In the future, passwords and tokens may be reinforced by biometrics (生物测定学), identification methods that use unique personal characteristics, such as fingerprints, skin oils, voice variations, and keyboard-typing rhythms.Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
进入题库练习
阅读理解Text 2 A report consistently brought back by visitors to the US is how friendly, courteous and helpful most Americans were to them
进入题库练习
阅读理解Archaeology as a profession faces two major problems
进入题库练习
阅读理解If you intend using humor in your talk to make people smile, you must know how to identify shared experiences and problems
进入题库练习
阅读理解Passage 3 New technology links the world as never before
进入题库练习
阅读理解Directions: There are 4 passages in this part. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice.Passage 1A child who has once been pleased with a tale likes, as a rule, to have it retold in identically the same words, but this should not lead parents to treat printed fairy stories as sacred texts. It is always much better to tell a story than to read it out of a book and, if a parent can produce an improvement on the printed text, so much the better.A charge made against fairy tales is that they harm the child by frightening him or arousing his sadistic impulses. To prove the latter, one would have to show in a controlled experiment that children who have read fairy stories were more often guilty of cruelty than those who had not. On the whole, their symbolic verbal discharge seems to be rather a safety valve than an incitement to overt action. As to fears, there are, I think, well-authenticated cases of children being dangerously terrified by some fairy story. Often, however, this arises from the child having been told the story on only one occasion. Familiarity with the story by repetition turns the pain of fear into the pleasure of a fear faced and mastered.There are also people who object to fairy stories on the grounds that they are not objectively true, that giants, witches, two-headed dragons, magic carpets, etc. do not exist; and that, instead of indulging his fantasies in fairy tales, the child should be taught how to adapt to reality by studying history and mechanics. I find such people, I must confess, so unsympathetic and peculiar that I do not know how to argue with them. If their case were sound, the world should be full of madmen attempting to fly from New York to Philadelphia on a broomstick or covering a telephone with kisses in the belief that it was their enchanted girlfriend.No fairy story ever claimed to be a description of the external world and no sane child has ever believed that it was.
进入题库练习
阅读理解Passage 1 Imagine a Hollywood movie with this plot: Lily Yang, a young widow, leaves Taiwan and immigrates to the United States, hoping her son Chih-Yuan will have a better life there
进入题库练习
阅读理解Passage D Petroleum products, such as gasoline, kerosene, home heating oil, residual fuel oil, and lubricating oils, come from one sourcecrude oil found below the earths surface, as well as under large bodies of water, from a few hundred feet below the surface to as deep as 25,000 feet into the earths interior
进入题库练习
阅读理解Passage 2 Open up most fashion magazines and you will see incredibly thin models with impossible hair and wearing unreasonably expensive, impracticably styled clothes
进入题库练习
阅读理解She sat at the window watching the evening invade the avenue
进入题库练习
阅读理解Passage 2 People do not analyze every problem they meet
进入题库练习
阅读理解Methodology should be based on what we know about language (what it is and how it operatesstill a matter of controversy); what we know about human beings (how they learn and how they learn language and whether these are different processes or merely different manifestations of the same process, another question still under investigation); and what we know about people in interaction (a prolific area of psychological study)
进入题库练习
阅读理解Passage 3 A controversy erupted in the scientific community in early 1998 over the use of DNA (deoxyribonucleic acid) fingerprinting in criminal investigations
进入题库练习
阅读理解Passage One Harvard thrilled middle-class patents last week by capping its tuition for families with incomes of up to $180,000 at 10 percent of their earnings
进入题库练习