2011年考研英语二真题(可复制搜索查词)

  • 格式:docx
  • 大小:190.46 KB
  • 文档页数:15

下载文档原格式

  / 15
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

绝密★启用前

2011年全国硕士研究生招生考试

英语(二)

(科目代码:204)

☆考生注意事项☆

1.答题前,考生须在试题册指定位置上填写考生编号和考生姓名;在答题卡

指定位置上填写报考单位、考生姓名和考生编号,并涂写考生编号信息点。

2.考生须把试题册上的“试卷条形码”粘贴条取下,粘贴在答题卡的“试卷

条形码粘贴位置”框中。不按规定粘贴条形码而影响评卷结果的,责任由考生自负。

3.选择题的答案必须涂写在答题卡相应题号的选项上,非选择题的答案必须

书写在答题卡指定位置的边框区域内。超出答题区域书写的答案无效;在草稿纸、试题册上答题无效。

4.填(书)写部分必须使用黑色字迹签字笔书写,字迹工整、笔迹清楚;涂

写部分必须使用2B铅笔填涂。

5.考试结束,将答题卡和试题册按规定交回。

(以下信息考生必须认真填写)

考生编号

考生姓名

Sec t ion I Use of Engl i sh

Direct ions:

Read the fo l lowing tex t . Choose the bes t word(s) for each nu mbered blank and mark A, B, C or D on A N S W E R S H EET 1. (10 poi nts )

The In te rne t af fords anony mi ty to i t s users , a blessing to pr ivacy and freedom of speech . But tha t very anony mity is a lso behind the explos ion of cyber -c r ime tha t has Can pr ivacy be prese rved seems increas ing ly 3 ?

Las t month , Ho ward Sch midt , the na t ion ’s cyber -cza r , of fe red the federa l govern ment a to make the W eb a safer place – a “vo luntary t rus ted ident i ty ” sys tem tha t would be the high-tech of a phys ica l key , a 1 across the Web .

2 br ing ing safe ty and secur i ty to a wor ld tha t 4 5 f ingerpr in t and a photo ID card , a l l ro l led smar t ident i ty card , or a dig i ta l credent ia l 6 one . The sys tem might use a to a speci f ic co mputer , and 7 w ould authen t ica te users at a range of onl ine serv ices .

The idea is to a federa t ion of pr iva te onl ine iden t i ty sys tems . Use rs could which sys tem to jo in , and only regis te red users whose ident i t ies have been authent ica ted could naviga te those sys tems. The approach cont ras t s with one tha t would require an In te rne t dr iver ’s l icense 10 by the govern ment .

Google and Microsof t ar e among co mpanies tha t a l ready have these “s ingle 8 9 s ign-on ” sys tems tha t make i t poss ib le for users to many di f fe ren t serv ices .

11 jus t once but use 12 , the approach would crea te a “wa l led garden ” in cyberspace , wi t h safe “ne ighborhoods ” and br ight “s t ree t l ights ” t o es tabl i sh a sense of a co m muni ty .

13 Mr. Sch midt descr ibed i t as a “vo luntary ecosys t e m ” in which “ind iv idual s and organiza t ions can co mple te onl ine t ransact ions wi th 14 , t rus t ing the ident i t i es of each other and the ident i t ies of the inf ras t ruc ture 15 which the t ransac t ion runs .”

St i l l , the ad minis t ra t ion ’s plan has 16 pr ivacy r igh ts ac t iv is t s . So me applaud the approach; others are concerned . I t see ms clear tha t such a sche me is an in i t ia t ive push toward what would 17 be a co mpulsory Interne t “dr iver ’s l i cense ” menta l i ty .

The plan has a lso been gree ted wi th 18 by so me co mputer secur i ty exper t s , who worry tha t the “vo luntary ecosys tem ” envis ioned by Mr. Sch midt w ould s t i l l leave much of the Interne t 19 . They argue tha t a l l In terne t users should be 20 to regis ter and ident i fy them selves , in the sa me way that drivers must be l icensed to dr ive on publ ic roads .

相关主题