2023年四川考研英語(yǔ)考試考前沖刺卷

上傳人:h****2 文檔編號(hào):186899034 上傳時(shí)間:2023-02-09 格式:DOCX 頁(yè)數(shù):111 大?。?4.46KB
收藏 版權(quán)申訴 舉報(bào) 下載
2023年四川考研英語(yǔ)考試考前沖刺卷_第1頁(yè)
第1頁(yè) / 共111頁(yè)
2023年四川考研英語(yǔ)考試考前沖刺卷_第2頁(yè)
第2頁(yè) / 共111頁(yè)
2023年四川考研英語(yǔ)考試考前沖刺卷_第3頁(yè)
第3頁(yè) / 共111頁(yè)

本資源只提供3頁(yè)預(yù)覽,全部文檔請(qǐng)下載后查看!喜歡就下載吧,查找使用更方便

15 積分

下載資源

資源描述:

《2023年四川考研英語(yǔ)考試考前沖刺卷》由會(huì)員分享,可在線(xiàn)閱讀,更多相關(guān)《2023年四川考研英語(yǔ)考試考前沖刺卷(111頁(yè)珍藏版)》請(qǐng)?jiān)谘b配圖網(wǎng)上搜索。

1、2023年四川考研英語(yǔ)考試考前沖刺卷 本卷共分為1大題50小題,作答時(shí)間為180分鐘,總分100分,60分及格。 一、單項(xiàng)選擇題(共50題,每題2分。每題的備選項(xiàng)中,只有一個(gè)最符合題意) 1.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so e

2、ffective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traf

3、fic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computer

4、s. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software,

5、thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F

6、was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating

7、 system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which user

8、s could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactl

9、y that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings -- signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of th

10、eir authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is

11、 only a matter of time before a truly devastating virus is unleashed.We learn from the passage that Welchi is() A.a(chǎn) wicked worm causing as many damages as Blaster did. B.a(chǎn) program designed by Haley to detect worms like Blaster. C.a(chǎn) program intended to fix the infected machines. D.a(chǎn) worm meant

12、to defeat the virus with pings. 2.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus

13、software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of

14、 an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to

15、look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that wo

16、rk this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allow

17、ing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software

18、to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was

19、 exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caus

20、ed almost as many problems as Blaster itself, by overwhelming networks with pings -- signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a nu

21、mber of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.The word "doctor

22、ed" ( Line 9, Paragraph 1 ) probably means() A.cured a disease, B.diagnosed a virus. C.became a doctor. D.changed to deceive. 3.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. So

23、Big. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired,

24、increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of in

25、fected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-v

26、irus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precur

27、sors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Wi

28、ndows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one

29、from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to ha

30、ve tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings -- signals that checked for the presence of other computers.Though both of these programs fell short of the apparent o

31、bjectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists ex

32、pect that it is only a matter of time before a truly devastating virus is unleashed.SoBig. F damaged computer programs mainly by() A.sending them an overpowering number of messages. B.harvesting the addresses stored in the computers. C.infecting the computers with an invisible virus. D.destroy

33、ing the anti-virus software of the computers. 4.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected

34、by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to

35、 the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had bee

36、n doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other v

37、iruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simulta

38、neously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing

39、that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the w

40、orm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, W

41、elchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings -- signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the sh

42、utdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.Wh

43、at can we infer from the last paragraph() A.Computer scientists are quit optimistic about the existing anti-virus programs. B.Computer scientists are looking forward to the coming anti-virus programs. C.Computer scientists consider the existing viruses not the really destructive ones. D.Comput

44、er scientists regard the coming viruses as the really destructive ones. 5.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruptio

45、n even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often

46、 bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent inf

47、ected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much m

48、ore effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could sen

49、d multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control anot

50、her. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weak

51、ness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However,

52、 according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings -- signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For in

53、stance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devasta

54、ting virus is unleashed.Compared with SoBig. F, Blaster was a virus that was() A.more destructive. B.more humorous. C.less vulnerable. D.less noticeable. 6.Text 3Of all the truths that this generation of Americans hold self-evident, few are more deeply embedded in the national psyche than the

55、 maxim It pays to go to college. Since the GI Bill trans-formed higher education in the aftermath of WWII, a college diploma, once a birthright of the leisured few, has become an attraction for the upwardly mobile, as integral to the American dream as the pursuit of happiness itself. The numbers tel

56、l the story: in 1950s, 43% of high-school graduates went on to pursue some form of higher education; at tile same time, only 6% of Americans were college graduates. But by 1998, almost 2 to out of 3 secondary-school graduates were opting for higher education -- and 21% of a much larger U.S. populati

57、on had college diplomas. As Prof. Herbert London of New York University told a commencement audience last June: the college experience has gone from a rite passage to a right of passage.However, as the class of 2004 is so painfully discovering, while a college diploma remains a requisite credential

58、for ascending the economic ladder, it no longer guarantees the good life. Rarely since the end of the Great Depression has the job outlook for college graduates appeared so bleak: of the 1.1 million students who received their bachelor degrees last spring, fewer than 20% had lined up full-time emplo

59、yment by commencement. Indeed, an uncertain job market has precipitated a wave of economic fear and trembling among the young. Many of my classmates are absolutely terrified, says one of the fortunate few who did manage to land a permanent position. They wonder if they’ll ever find a job.Some

60、of this recession-induced anxiety will disappear if a recovery finally begins to generate jobs at what economists consider a normal rate. But the sad fact is that for the foreseeable future, college graduates will in considerable surplus, enabling employers to require a degree even for jobs for whic

61、h a college education is really unnecessary. According to Kristina Shelley of the Bureau of Labor Statistics -- who bases her estimate on a moderate projection of current trends -- 30 per- cent of college graduates entering the labor t0rce between now and the year 2008 will be unemployed or will fin

62、d employment in jobs for which they will be overqualified, joining what economists call the educationally underutilized.Indeed, it may be quite a while-- if ever -- before those working temporarily as cocktail waitresses or taxi drivers will be able to pursue their primary, career paths. Of course w

63、aiting on tables and bustling cab fares are respectable ways to earn a living. But they are not quite what so many young Americans -- and their parents -- had in mind as the end product of four expensive years in college.The author tries to convince us that() A.college education paves the way for

64、 future success. B.higher education faces an unforeseeable future. C.a(chǎn) college diploma is the necessary credential for better jobs. D.the purely economic reason for college is not as compelling as it once was. 7.Text 3Of all the truths that this generation of Americans hold self-evident, few are

65、 more deeply embedded in the national psyche than the maxim It pays to go to college. Since the GI Bill trans-formed higher education in the aftermath of WWII, a college diploma, once a birthright of the leisured few, has become an attraction for the upwardly mobile, as integral to the American drea

66、m as the pursuit of happiness itself. The numbers tell the story: in 1950s, 43% of high-school graduates went on to pursue some form of higher education; at tile same time, only 6% of Americans were college graduates. But by 1998, almost 2 to out of 3 secondary-school graduates were opting for higher education -- and 21% of a much larger U.S. population had college diplomas. As Prof. Herbert London of New York University told a commencement audience last June: the college experience has gone fro

展開(kāi)閱讀全文
溫馨提示:
1: 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
2: 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
3.本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
5. 裝配圖網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

相關(guān)資源

更多
正為您匹配相似的精品文檔
關(guān)于我們 - 網(wǎng)站聲明 - 網(wǎng)站地圖 - 資源地圖 - 友情鏈接 - 網(wǎng)站客服 - 聯(lián)系我們

copyright@ 2023-2025  sobing.com 裝配圖網(wǎng)版權(quán)所有   聯(lián)系電話(huà):18123376007

備案號(hào):ICP2024067431號(hào)-1 川公網(wǎng)安備51140202000466號(hào)


本站為文檔C2C交易模式,即用戶(hù)上傳的文檔直接被用戶(hù)下載,本站只是中間服務(wù)平臺(tái),本站所有文檔下載所得的收益歸上傳人(含作者)所有。裝配圖網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)上載內(nèi)容本身不做任何修改或編輯。若文檔所含內(nèi)容侵犯了您的版權(quán)或隱私,請(qǐng)立即通知裝配圖網(wǎng),我們立即給予刪除!