admin 管理员组文章数量: 887021
2024年3月9日发(作者:enable sb to do sth造句)
香港中文大学笔试题
———————————————————————————————— 作者:
———————————————————————————————— 日期:
清华大学-香港中文大学
2008年合作招收金融财务MBA入学试题
(笔试部分)
注意事项
1.本试卷包括英语、逻辑和数学,分别占50%、30%和20%,总分为100分;
2.答题时请将答案写在答题纸上,每个题只有唯一正确答案;
3.将本试题、答题纸及草稿纸全部留下,考试结束后将被统一收回。
姓名: ﻩ ﻩ 考号
身份证号:
一、英语部分(50%)
PART I Structure and Vocabulary (25×1%=25%)
Directions: There are 25 incomplete sentences in this part. For each sentence the
re are four choices marked A, B, C and D. Choose the ONE answer that
best completes the sentence. Then blacken the corresponding letter on
the Answer Sheet with a pencil.
1.
The rats _____bacterial infections of the blood.
A. develop ﻩﻩB. produce ﻩ
C. stimulate D. induce
2.
The first, second, and the third prizes went to Jack, Tom, and Harry_
____.
A. equally ﻩB. differently ﻩC. similarly ﻩﻩD. respectively
3.
More than 85 percent of French Canada’s population speaks French as a mo
ther tongue and _____to the Roman Catholic faith.
A. asceribes ﻩ B. subsceibes
ﻩC. adheres D. caters
4.
When the work is well done, a _____of accident free operations is est
ablished where time lost due to injuries is kept at a minimum.
A. regulation ﻩB. climate ﻩC. circumstance
ﻩD. requirement
5.
In order to prevent stress from being set up in the metal, expansion j
oins are fitted which _____the stress by allowing the pipe to expa
nd or contract freely.
A. reclaim B. reconcileﻩﻩC. rectify ﻩ D. relieve
6.
Dozens of scientific groups all over the world have been _____the go
al of a practical and economic way to use sunlight to split water molec
ules.
A. pursuing ﻩB. chasing ﻩC. reaching D. winning
7.
When traveling, you are advised to take travelers’ checks, which pro
vide a secure _____to carrying your money in cash.
A. substitute
B. selection ﻩC. preference ﻩD. alternative
8.
I never trusted him because I always thought of him as such a
_____character.
A. Gracious ﻩﻩB. suspicious
ﻩ C. unique ﻩﻩD. particular
9.
For example, it has long been known that total sleep _____is 100
percent fatal to rats.
A. reduction ﻩB. destruction
restriction
C. deprivation ﻩD.
10.
Many old people in the cities find themselves unable to get used to the
rapid _____of city life.
A. rate
B. speed C. step ﻩD. pace
11.
The captain of the ship _____the passengers that there was no d
anger.
A. assured ﻩﻩB. ensured ﻩ C. secured ﻩﻩD. insured
12.
The speaker who does not have specific words in his working voc
abulary may be unable to explain or describe in a _____that can be
understood by his listeners.
A. case ﻩB. means ﻩﻩC. method
D. way
13.
Industrial safety does not just happen. Companies with low accident
rates plan their safety programs, work hard to organize them, and co
ntinue working to keep them _____and active.
A. Alive B. vivid ﻩC. mobile ﻩ D. diverse
14.
The key to the industrialization of space is the U.S. space shuttle.
With it, astronauts will acquire a workhorse vehicle _____of flyi
ng into space and returning many times.
A. capable ﻩB. suitable ﻩ C. efficient ﻩ
D. fit
15.
The discussion was so prolonged and exhausting that _____the s
peakers stopped for refreshments.
A. at large ﻩ B. at intervals
ﻩC. at ease ﻩﻩD. at random
16.
In no country _____Britain, it has been said, can one experience four
seasons in the course of a single day.
A. other than ﻩB. more thanﻩ
C. better than D. rather than
17.
So little _____ about physics that the lecture was completely beyond
me.
A. I knew
B. did I know ﻩﻩC. I had known D. had I known
18.
Concerns were raised _____witnesses might be encouraged to exagger
ate their stories.
A. what ﻩﻩB. when ﻩﻩC. which ﻩﻩD. that
19.
It can be ready for _____trip in about two weeks.
A. new
B. another ﻩC. certain D. subsequent
20.
To drive and _____ within the speed limits _____ necessary in t
oday’s traffic.
A. staying/is ﻩB. to stay/are ﻩC. to stay/is ﻩﻩD. staying/are
PART II Reading Comprehension (15×2%=30%)
Directions: There are 3 passages in this part. Each passage is followed by som
e questions or unfinished statements. For each of them here are four ch
oices marked A, B, C and D. You should decide on the best choic
e and blacken the corresponding letter on the Answer Sheet with a pencil.
Questions 21 to 25 are based on the following passage:
While hackers with motives make headlines, they represent less than 20%
of all network security breaches. More common are instances of authorize
d users accidentally winding up where they should not be and ina
dvertently deleting or changing data. However, the Internet introduces another
concern: some Internet surfers are bound to go where they have no bu
siness and, in so dong, threaten to wipe out data to which they should
not have access.
Before picking a firewall, companies need to adopt security policies. A security
policy states who or what is allowed to connect to whom or what. You
can group all users by department or classification. The better firewall
products let you drag and drop groups in a graphical user interface (GU
I) environment to define network security easily.
Two methods are most often used together to establish an Internet firewall.
They are application and circuit gateways, as well as packet filtering.
With application and circuit gateways, all packets are addressed to a user
-level application on a gate-way that relays packets between two points. Wit
h most application gateways, additional packet-filter machines are r
equired to control and screen traffic between the gateway and the networ
ks. A typical configuration includes two routers with a bastion host that
serves as the application gateway sitting between them.
A drawback to application and circuit gateways is that they slow network
performance. This is because each packet must be copied and processed
at least twice by all the communication layers. Packet-filter gateway
s, which act as routers between two nets, are less secure than applica
tion gateways but more efficient. They are transparent to many pro
tocols and applications, and they require no changes in client applicatio
ns, no specific application management or installation, and no e
xtra hardware.
Using a single, unified packet-filter engine, all net traffic is process
ed and then forwarded or blocked from a single point of control. Howev
er, most packet filters are stateless, understand only low-level protoc
ols, and are difficult to configure and verity. In addition, they lack audi
t mechanisms. Some packet filters are implemented inside routers,
limiting computing power and filtering capabilities. Others are imp
lemented as software packages that filter the packets in application-layer proc
esses, an inefficient approach that requires multiple data copies,
expensive delays and context switches and delivers lower thr
oughput.
So what’s a network administrator to do? Some vendors are developing firewalls
that overcome many of these problems and combine the advantages of a
pplication gateways and packet filtering. These efficient, protocol-ind
ependent, secure firewall engines are capable of application-level sec
urity, user authentication, unified support, and handling of all protoc
ols, auditing and altering. They are transparent to users and to syste
m setup, and include a GUI for simple and flexible system management and
configuration.
21.
The most suitable title for this passage is _____.
A. Hackers and Our Defense
B. Internet Surfer’s Guide
C. Firewall: A Measure of Network Security
D. Information Technology
22.
According to what you have read, the author’s probable p
reference will be_____.
A. walling for the coming of better firewall products.
B. finding a combination of both application gateway and packet filteri
ng approach
C. meeting demands of every type with better products
D. implementing one better approach in the adoption of a firewall sol
ution
23.
In choosing a firewall product, what is implied as the main concern of
the author?
A. Management ﻩB. Transparency
C. Independenceﻩﻩ ﻩD. Efficiency
24.
Which of the following can be inferred from the passage concerning
the networks using application and circuit gateways?
A. Secure and speedy ﻩ B. Secure but slow
C. Insecure and slowﻩ D. Insecure but speedy
25.
For whom is this passage most likely written:
A. Government officials ﻩB. Hackers
C. Network administrators D. Computer experts.
Questions 26 to 30 are based on the following passage:
Internet is a global network that connects other computer networks, together
with software and protocols for controlling the movement of data. The
Internet, often referred to as“the Net”, was initiated in 1969 by a grou
p of universities and private research groups funded by the U.S. De
partment of Defense. It now covers almost every country in the wo
rld. Its organization is informal and deliberately nonpolitical, and its
controllers tend to concentrate on technical aspects rather than o
n administrative control.
The Internet offers users number of basic services including data transfer,
electronics mail, and the ability to access information in remote to
exchange information and debate specific subjects of interest. In additio
n, there are a number of high-level services. For example, MBON
E allows the transmission of messages to more than one destination.
It is used in video conferencing. The World Wide Web, known as“th
e Web”,is another high level Internet service, developed in the 1990s in
Geneva. It is a service for distributing multimedia information, i
ncluding graphics, pictures, sounds, and video as well as text. A fea
ture of the World Wide Web is that it allows links to other related docum
ents elsewhere on the Internet. Documents for publication on the Web are
presented in a form known as HTML (hypertext mark up language). This
allows a specification of the page layout and typography as it will app
ear on the screen. It also allows the inclusion of active links to othe
r documents. Generally, these appear on the screen display as highl
ighted text or as additional icons. Typically, the user can use a mo
use to “click”on one of these points to load and view a related docume
nt. Many commercial and public organizations now have their own Web
site (specified by an address code)and publish a “home page”,giving
information about the organization.
Up to the mid 1990s, the major users of the Internet were academic
and research organizations. This has begun to change rapidly with individ
ual home users linking in through commercial access providers and with a
growing interest by companies in using the Internet for publicity,
sales, and as a medium for electronic publishing. At the same tine, the
re are problems with the flow of information across national borders, bri
nging in debates about copyright protection, data protection, the
publication of pornography, and ultimately political control and c
ensorship.
26.
From the first paragraph, we learn that the Internet _____.
A. was initiated by the U.S. Department of Defense in 1969
B. was only able to connect computers into networks into at its beginnin
g
C. has not any kind of organization behind it at all
D. works independently of any governmental control
27.
Access to remote information_____.
A. is a high level service provided by the Internet
B. is the most notable feature with the Internet
C. is a basic function performed by the Internet
D. can only be achieved by the Internet
28.
It can be inferred that the development of HTML prepared the way for_____.
A. even farther information transfer
B. online commercial promotions
C. academic uses
D. distributing multimedia information
29.
Which of the following is not a problem brought in by the populariz
ation of the Internet?
A. Difficulty in inspecting the content of publications.
B. Difficulty in protecting copy right across national borders.
C. Difficulty in promoting sales of superior products.
D. The possibility that potentially harmful content may be published
30.
This passage focuses on_____.
A. the instructions for the Internet users
B. the historical development of the Internet
C. the kinds of data transferred through the Internet
D. the problems brought about the Internet
Questions 31 to 35 are based on the following passage:
The relationship between the home and market economies has gone thoug
h two distinct stages. Early industrialization begin the process of tr
ansferring some production process (e.g. cloth making, sewing and canning
food) from the home to the marketplace. Although the home economy coul
d still produce these good, the more important second stage was eviden
t-the marketplace, and home economy was unable to produce them, e.g. elect
ricity and electrical appliances the automobile, advanced education, sophis
ticated medical care. In the second stage, the question of whether th
e home economy was less efficient in producing these new goods and
service was irrelevant; if the family were to enjoy these fruits of indu
版权声明:本文标题:香港中文大学笔试题 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.freenas.com.cn/free/1709982121h552722.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论