当前位置:研教网 > 试题 > 同等学力申硕英语阅读练习题及试题详解
同等学力申硕英语阅读练习题及试题详解
来源:在职研究生招生信息网 发布时间:2017-04-18 14:01:50 发布者:
  同等学力申硕的英语阅读在考试中所占分值很大,考生要好好复习。在考生复习过程中,考生要多做一些练习题,下面整理的是同等学力申硕英语阅读练习题及试题详解。

 

  New and bizarte crimes have come into being with the advent of computer technology.Organized crime too has been directly involved;the new technology offers it unlimited opportunities,such as data crimes,theft of services,property-related crimes,industrial sabotage,politically related sabotage,vandalism,crimes against the individual and financially related crimes.

 

  1. ______________________ This is usually the theft or copying of valuable computer program..An international market already exists for computerized data,and specialized fences are said to be playing a key role in this rapidly expanding criminal market.Buyers for stolen programs may range from a firm's competitors to foreign nations.

 

  2. ______________________ This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm.With the growing reliance by firms on computers for their recordkeeping and daily oprations,sabotage of their computers can result in internal havoc,after which the group interested in acquiring the firm can easily buy it at a substantially lower price.Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.

 

  3.______________________ Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack.Several attempts have already been made to destroy computer facility at an air force base.A university computer facility involved in national defence work suffered more than$2million in damages as a result of a bombing.Computer vulnerability has been amply documented.

 

  4. ______________________ Organized criminal syndicate have shown their willingness to work with politically motivated groups.Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics.Criminal groups have taken attempts in assassinating political leaders Computers are used in hospital life-support system,in laboratories,and in major surgery.Criminals could easily turn these computers into tools of devastation.By sabotaging the computer of a life-support system,criminals could kill an individual as easily as they and used a gun.By manipulating a computer,they could guide awesome tools of terror against large urban centers.Cities and nations could be come hostages.Homicide could take a new form.The computer may become the hit man of the twentieth century.

 

  The computer opens vast areas of crime to organized criminal groups,both national and international.It calls on them to pool their resources and increase their cooperative efforts,because many of these crimes are too complex for one group to handle,especially those requiting a vast network of fences.

 

  5. ______________________ .

 

  [A]Computer crime can involve criminal activities that are traditional in nature,such as theft,fraud,forgery and mischief,all of which are generally subject everywhere to criminal sanctions.The computer has also created a host of potentially new misuses or abuses that may,or should,be criminal as well.

 

  [B]One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage.

 

  [C]Although criminals have adapted to computer technology,law enforcement has not.Many still think in terms of traditional criminology.

 

  [D]Theft of data,or data crime,has attracted the interest of organized criminal syndicates.

 

  [E]The number of verifiable computer crimes is not,therefore,very high.

 

  [F]A competitor sabotages a company's computer system to destroy or cripple the firm'operational ability,thus neutralizing its competitive capability either in the private or the government sector.

 

  [G]Politically motivated sabotage is on the increase;political extremist groups have sprouted on every continent.

 

  试题详解

 

  语篇结构:现象→重要性和意见→结论看法

 

  答案解析

 

  1.D答题线索:上下文一致。从第一段我们可以了解到计算机新技术犯罪的类型。从本段我们可以知道所说的是计算机化的数据犯罪问题。由此,我们可以推断出第一句中心句所说的应该就是关于数据犯罪的问题。所以,我们不难选出B项为正确答案。

 

  2.F答题线索:段落一致性。从本段我们可以了解到其大意是计算机的破坏给企业所带来的影响。而有些公司则利用这一点来达到其不可告人的目的。通过本段的大意,我们再来看选项,我们可以看到选项F正好符合题意,为正确答案。

 

  3.G答题线索:段落一致性。本句这段所举的例子:摧毁一空军基地的计算机和大学计算机设施的爆炸,这些都是具有政治目的性的破坏,也就是属于第一段所说的"与政治有关的破坏"。很明显,选项G的意思与其相一致,因此为正确答案。

 

  4.B答题线索:段落一致性。通读本句的文段内容,我们可以了解到计算机很容易遭到犯罪集团的破坏。也就是说不管是政府的计算机还是私人的计算机系统都很容易遭到计算机罪犯的破坏,换一句话就是说政府和私人的计算机系统都还没有足够的防破坏的能力。通过这样的逻辑分析,我们就可以不难选出B项为正确答案。

 

  5.C答题线索:上下文一致。纵观全文,我们可以知道整篇文章所说的都是关于计算机技术犯罪的问题。而在最后我们可以推断出作者应该是发表了他对此的观点和看法。从C项我们可以看出作者提出了法制还需健全的观点,对计算机的犯罪我们不应该还停留在用传统的犯罪学来思考问题。因此,选择C为正确答案。

 

  参考译文

 

  随着计算机技术的出现,产生了新的奇怪的犯罪。有组织的犯罪团伙也直接参与:新技术为犯罪提供了无数的机会:如数据信息犯罪、偷窃服务项目、与财产有关的犯罪、工业破坏、与政治有关的破坏、对文化的破坏、针对个人的犯罪和与金融有关的罪行等。

 

  1.偷窃数据或数据犯罪已引起有组织的犯罪辛迪加(集团)的兴趣。通常这是偷窃或抄袭珍贵的计算机程序。关于计算机化的数据已有了国际市场,据说在这种迅速扩大的犯罪市场上专业化的电子栅栏起着关键作用。这种盗版程序的买主有公司的竞争对手也有外国竞争对手。

 

  2.破坏一个公司的计算机系统是为了破坏或削弱公司的运行能力,从而使其丧失在私人或政府部门的竞争能力。计算机的破坏也可能牵扯到富裕的投资者想得到受害公司的企图。由于公司越来越多地依靠计算机进行记录贮存和日常运行,对计算机的破坏会导致内部大浩劫。此后有意得到该公司的集团会以相当低的价格轻而易举地把它买到手。如果这个公司是由有组织的犯罪操纵和控制的企业的对手,则该犯罪团伙也可能利用破坏。

 

  3.有政治动机的破坏正在上升;在每个大陆都兴起了政治极端分子集团。复杂的计算机技术用可怕的力量武装了这些集团,而且打开了许多技术先进的国家让他们攻击。为了摧毁一空军基地的计算机设施,已进行了多次尝试。与国家防卫工作有关的一个大学计算机设施由于一次爆炸破坏损失200万美元以上。计算机屡遭破坏的情况已多有记载。

 

  4.一个国会的调查表明;无论是政府还是私人的计算机系统都没有足够的防破坏的能力。有组织的犯罪集团已表示他们想与政治集团合作的愿望。调查已发现犯罪集团和外国政府在麻醉剂方面的合作。犯罪集团已多次试图杀领袖……。计算机应用于医院生命维持系统、实验室以及重大手术。罪犯们会很容易地把这些计算机变成破坏的工具。通过破坏生命维持系统的计算机,罪犯可以像用枪一样容易杀人。通过操纵计算机,他们可以引导这些恐怖的工具攻击大的城市中心。城市和国家都可能变成人质。谋杀会有一种新形式。计算机可能会成为20世纪的职业杀手。

 

  计算机为国内外有组织地犯罪集团开辟了广阔的犯罪领域。它要求他们集中资源,增强合作力量,因为许多这种犯罪太复杂,一个集团难以处理,特别是那些需要庞大的电子栅栏网络的犯罪。

 

  5.虽然罪犯已适应了计算机技术,但法制还没有。许多人还用传统的犯罪学思考问题。

京ICP备09046824号-1

地址:北京市海淀区理工科技大厦 电话: 400-617-2669

在线报名

毕业时间: