admin 管理员组

文章数量: 887021


2024年3月9日发(作者:enable sb to do sth造句)

香港中文大学笔试题

———————————————————————————————— 作者:

———————————————————————————————— 日期:

清华大学-香港中文大学

2008年合作招收金融财务MBA入学试题

(笔试部分)

注意事项

1.本试卷包括英语、逻辑和数学,分别占50%、30%和20%,总分为100分;

2.答题时请将答案写在答题纸上,每个题只有唯一正确答案;

3.将本试题、答题纸及草稿纸全部留下,考试结束后将被统一收回。

姓名: ﻩ ﻩ 考号

身份证号:

一、英语部分(50%)

PART I Structure and Vocabulary (25×1%=25%)

Directions: There are 25 incomplete sentences in this part. For each sentence the

re are four choices marked A, B, C and D. Choose the ONE answer that

best completes the sentence. Then blacken the corresponding letter on

the Answer Sheet with a pencil.

1.

The rats _____bacterial infections of the blood.

A. develop ﻩﻩB. produce ﻩ

C. stimulate D. induce

2.

The first, second, and the third prizes went to Jack, Tom, and Harry_

____.

A. equally ﻩB. differently ﻩC. similarly ﻩﻩD. respectively

3.

More than 85 percent of French Canada’s population speaks French as a mo

ther tongue and _____to the Roman Catholic faith.

A. asceribes ﻩ B. subsceibes

ﻩC. adheres D. caters

4.

When the work is well done, a _____of accident free operations is est

ablished where time lost due to injuries is kept at a minimum.

A. regulation ﻩB. climate ﻩC. circumstance

ﻩD. requirement

5.

In order to prevent stress from being set up in the metal, expansion j

oins are fitted which _____the stress by allowing the pipe to expa

nd or contract freely.

A. reclaim B. reconcileﻩﻩC. rectify ﻩ D. relieve

6.

Dozens of scientific groups all over the world have been _____the go

al of a practical and economic way to use sunlight to split water molec

ules.

A. pursuing ﻩB. chasing ﻩC. reaching D. winning

7.

When traveling, you are advised to take travelers’ checks, which pro

vide a secure _____to carrying your money in cash.

A. substitute

B. selection ﻩC. preference ﻩD. alternative

8.

I never trusted him because I always thought of him as such a

_____character.

A. Gracious ﻩﻩB. suspicious

ﻩ C. unique ﻩﻩD. particular

9.

For example, it has long been known that total sleep _____is 100

percent fatal to rats.

A. reduction ﻩB. destruction

restriction

C. deprivation ﻩD.

10.

Many old people in the cities find themselves unable to get used to the

rapid _____of city life.

A. rate

B. speed C. step ﻩD. pace

11.

The captain of the ship _____the passengers that there was no d

anger.

A. assured ﻩﻩB. ensured ﻩ C. secured ﻩﻩD. insured

12.

The speaker who does not have specific words in his working voc

abulary may be unable to explain or describe in a _____that can be

understood by his listeners.

A. case ﻩB. means ﻩﻩC. method

D. way

13.

Industrial safety does not just happen. Companies with low accident

rates plan their safety programs, work hard to organize them, and co

ntinue working to keep them _____and active.

A. Alive B. vivid ﻩC. mobile ﻩ D. diverse

14.

The key to the industrialization of space is the U.S. space shuttle.

With it, astronauts will acquire a workhorse vehicle _____of flyi

ng into space and returning many times.

A. capable ﻩB. suitable ﻩ C. efficient ﻩ

D. fit

15.

The discussion was so prolonged and exhausting that _____the s

peakers stopped for refreshments.

A. at large ﻩ B. at intervals

ﻩC. at ease ﻩﻩD. at random

16.

In no country _____Britain, it has been said, can one experience four

seasons in the course of a single day.

A. other than ﻩB. more thanﻩ

C. better than D. rather than

17.

So little _____ about physics that the lecture was completely beyond

me.

A. I knew

B. did I know ﻩﻩC. I had known D. had I known

18.

Concerns were raised _____witnesses might be encouraged to exagger

ate their stories.

A. what ﻩﻩB. when ﻩﻩC. which ﻩﻩD. that

19.

It can be ready for _____trip in about two weeks.

A. new

B. another ﻩC. certain D. subsequent

20.

To drive and _____ within the speed limits _____ necessary in t

oday’s traffic.

A. staying/is ﻩB. to stay/are ﻩC. to stay/is ﻩﻩD. staying/are

PART II Reading Comprehension (15×2%=30%)

Directions: There are 3 passages in this part. Each passage is followed by som

e questions or unfinished statements. For each of them here are four ch

oices marked A, B, C and D. You should decide on the best choic

e and blacken the corresponding letter on the Answer Sheet with a pencil.

Questions 21 to 25 are based on the following passage:

While hackers with motives make headlines, they represent less than 20%

of all network security breaches. More common are instances of authorize

d users accidentally winding up where they should not be and ina

dvertently deleting or changing data. However, the Internet introduces another

concern: some Internet surfers are bound to go where they have no bu

siness and, in so dong, threaten to wipe out data to which they should

not have access.

Before picking a firewall, companies need to adopt security policies. A security

policy states who or what is allowed to connect to whom or what. You

can group all users by department or classification. The better firewall

products let you drag and drop groups in a graphical user interface (GU

I) environment to define network security easily.

Two methods are most often used together to establish an Internet firewall.

They are application and circuit gateways, as well as packet filtering.

With application and circuit gateways, all packets are addressed to a user

-level application on a gate-way that relays packets between two points. Wit

h most application gateways, additional packet-filter machines are r

equired to control and screen traffic between the gateway and the networ

ks. A typical configuration includes two routers with a bastion host that

serves as the application gateway sitting between them.

A drawback to application and circuit gateways is that they slow network

performance. This is because each packet must be copied and processed

at least twice by all the communication layers. Packet-filter gateway

s, which act as routers between two nets, are less secure than applica

tion gateways but more efficient. They are transparent to many pro

tocols and applications, and they require no changes in client applicatio

ns, no specific application management or installation, and no e

xtra hardware.

Using a single, unified packet-filter engine, all net traffic is process

ed and then forwarded or blocked from a single point of control. Howev

er, most packet filters are stateless, understand only low-level protoc

ols, and are difficult to configure and verity. In addition, they lack audi

t mechanisms. Some packet filters are implemented inside routers,

limiting computing power and filtering capabilities. Others are imp

lemented as software packages that filter the packets in application-layer proc

esses, an inefficient approach that requires multiple data copies,

expensive delays and context switches and delivers lower thr

oughput.

So what’s a network administrator to do? Some vendors are developing firewalls

that overcome many of these problems and combine the advantages of a

pplication gateways and packet filtering. These efficient, protocol-ind

ependent, secure firewall engines are capable of application-level sec

urity, user authentication, unified support, and handling of all protoc

ols, auditing and altering. They are transparent to users and to syste

m setup, and include a GUI for simple and flexible system management and

configuration.

21.

The most suitable title for this passage is _____.

A. Hackers and Our Defense

B. Internet Surfer’s Guide

C. Firewall: A Measure of Network Security

D. Information Technology

22.

According to what you have read, the author’s probable p

reference will be_____.

A. walling for the coming of better firewall products.

B. finding a combination of both application gateway and packet filteri

ng approach

C. meeting demands of every type with better products

D. implementing one better approach in the adoption of a firewall sol

ution

23.

In choosing a firewall product, what is implied as the main concern of

the author?

A. Management ﻩB. Transparency

C. Independenceﻩﻩ ﻩD. Efficiency

24.

Which of the following can be inferred from the passage concerning

the networks using application and circuit gateways?

A. Secure and speedy ﻩ B. Secure but slow

C. Insecure and slowﻩ D. Insecure but speedy

25.

For whom is this passage most likely written:

A. Government officials ﻩB. Hackers

C. Network administrators D. Computer experts.

Questions 26 to 30 are based on the following passage:

Internet is a global network that connects other computer networks, together

with software and protocols for controlling the movement of data. The

Internet, often referred to as“the Net”, was initiated in 1969 by a grou

p of universities and private research groups funded by the U.S. De

partment of Defense. It now covers almost every country in the wo

rld. Its organization is informal and deliberately nonpolitical, and its

controllers tend to concentrate on technical aspects rather than o

n administrative control.

The Internet offers users number of basic services including data transfer,

electronics mail, and the ability to access information in remote to

exchange information and debate specific subjects of interest. In additio

n, there are a number of high-level services. For example, MBON

E allows the transmission of messages to more than one destination.

It is used in video conferencing. The World Wide Web, known as“th

e Web”,is another high level Internet service, developed in the 1990s in

Geneva. It is a service for distributing multimedia information, i

ncluding graphics, pictures, sounds, and video as well as text. A fea

ture of the World Wide Web is that it allows links to other related docum

ents elsewhere on the Internet. Documents for publication on the Web are

presented in a form known as HTML (hypertext mark up language). This

allows a specification of the page layout and typography as it will app

ear on the screen. It also allows the inclusion of active links to othe

r documents. Generally, these appear on the screen display as highl

ighted text or as additional icons. Typically, the user can use a mo

use to “click”on one of these points to load and view a related docume

nt. Many commercial and public organizations now have their own Web

site (specified by an address code)and publish a “home page”,giving

information about the organization.

Up to the mid 1990s, the major users of the Internet were academic

and research organizations. This has begun to change rapidly with individ

ual home users linking in through commercial access providers and with a

growing interest by companies in using the Internet for publicity,

sales, and as a medium for electronic publishing. At the same tine, the

re are problems with the flow of information across national borders, bri

nging in debates about copyright protection, data protection, the

publication of pornography, and ultimately political control and c

ensorship.

26.

From the first paragraph, we learn that the Internet _____.

A. was initiated by the U.S. Department of Defense in 1969

B. was only able to connect computers into networks into at its beginnin

g

C. has not any kind of organization behind it at all

D. works independently of any governmental control

27.

Access to remote information_____.

A. is a high level service provided by the Internet

B. is the most notable feature with the Internet

C. is a basic function performed by the Internet

D. can only be achieved by the Internet

28.

It can be inferred that the development of HTML prepared the way for_____.

A. even farther information transfer

B. online commercial promotions

C. academic uses

D. distributing multimedia information

29.

Which of the following is not a problem brought in by the populariz

ation of the Internet?

A. Difficulty in inspecting the content of publications.

B. Difficulty in protecting copy right across national borders.

C. Difficulty in promoting sales of superior products.

D. The possibility that potentially harmful content may be published

30.

This passage focuses on_____.

A. the instructions for the Internet users

B. the historical development of the Internet

C. the kinds of data transferred through the Internet

D. the problems brought about the Internet

Questions 31 to 35 are based on the following passage:

The relationship between the home and market economies has gone thoug

h two distinct stages. Early industrialization begin the process of tr

ansferring some production process (e.g. cloth making, sewing and canning

food) from the home to the marketplace. Although the home economy coul

d still produce these good, the more important second stage was eviden

t-the marketplace, and home economy was unable to produce them, e.g. elect

ricity and electrical appliances the automobile, advanced education, sophis

ticated medical care. In the second stage, the question of whether th

e home economy was less efficient in producing these new goods and

service was irrelevant; if the family were to enjoy these fruits of indu


本文标签: 答题 逻辑 全部