中山大学博士研究生入学考试英语试题Word格式.docx
《中山大学博士研究生入学考试英语试题Word格式.docx》由会员分享,可在线阅读,更多相关《中山大学博士研究生入学考试英语试题Word格式.docx(15页珍藏版)》请在冰豆网上搜索。
Directions:
Thereare3readingpassagesinthispart.Eachpassageisfollowedbysomequestionsorunfinishedstatements.ForeachofthemtherearefourchoicesmarkedA,B,CandD.YoushoulddecideonthebestchoiceandmarkthecorrespondingletterontheANSWERSHEETwithasinglelinethroughthecenter.
PassageOne
Questions1~5arebasedonthefollowingpassage:
Forthelongesttime,Icouldn’tgetworkedupaboutprivacy:
myrighttoit;
howit’sdying;
howwe’reheadedforanevenmorewired,underregulated,overinstrusive,privacy-deprivedplanet.
IshouldalsopointoutthatasnewsdirectorforPathfinder,TimeInc’smegainfomall,andaguywhomakeshislivingontheWeb,Iknowbetterthanmostpeoplethatwe’rehurtlingtowardanevenmoreintrusiveworld.We’reallbeingwatchedbycomputerswheneverwevisitWebsites;
bythemereactof“browsing”(itsoundssopassive!
)we’re
goingpublicinawaythatwasunimaginableadecadeago.IknowthisbecauseI’mawatchertoo.WhenpeoplecometomyWebsite,withouteverknowingtheirnames,Icanpeerovertheirshoulders,recordingwhattheylookat,timinghowlongtheystayonaparticularpage,followingthemaroundPathfinder’ssprawlingofferings.
Noneofthiswouldbothermeintheleast,Isuspect,ifafewyearsago,myphone,likeMarley’sghost,hadn’tgivenmeaglimpseofthenightmarestocome.OnThanksgivingweekendin1995,someone(presumablyacriticofabookmywifeandIhadjustwrittenaboutcomputerhackers)forwardedmyhometelephonenumbertoanout-of-stateansweringmachine’whereunsuspectingcallerstryingtoreachmeheardamalevoiceidentifyhimselfasmeandsaysomeextremelyrudethings.Then,withtypicalhackeraplomb,thepranksteraskedpeopletoleavetheirmessages(whichtomysurprisemanyCallers,includingmymother,did).ThiswentonforseveraldaysuntilmywifeandIfiguredoutthatsomethingwaswrong(“Hey…whyhasn’tthephonerungsinceWednesday?
”)andgotourphoneservicerestored.
Itseemedfunnyatfirst,anditgaveusaswellstorytotellonourbooktour.Buttheinterloperwhoseizedourtelephonelinecontinuedtohitusevenafterthetourended.Andhitusagainandagainforthenextsixmonths:
Thephonecompanyseemedpowerless.Itssecurityfolksmovedustooneunlistednumberafteranother’halfadozentimes.Theyputspecialpincodesinplace.Theyputtracesontheline.Butthetroublemakerkeptbreakingthrough.
Ifourhackerhadbeentrulyevilandomnipotentasonlyfictionalmoviehackersare,therewouldprobablyhavebeenevenworsewayshecouldhavethreatenedmyprivacy.Hecouldhavesabotagedmycreditrating.Hecouldhaveeavesdroppedonmytelephoneconversationsorsiphonedoffmye-mail.Hecouldhavecalledinmymortgage,discontinuedmyhealthinsuranceorobliteratedmySocialSecuritynumber.LikeSandraBullockintheNet,Icouldhavebeenadigitaluntouchable,wanderingtheplanetwithoutaconnectiontotherestofhumanity.(AlthoughifIdidn’thavetopaybackschoolloans,itmightbeworthit.Justathought。
)
Still,Irememberfeelingviolatedatthetimeandaspowerlessasaminnowinaflashflood.Someonewasinvadingmyprivatespace-myfamily’sprivatespace-andtherewasnothingIortheauthoritiescoulddo.ItwasasclosetoatechnologicalepiphanyasIhaveeverbeen.Andas1watchedmypersonaldigitalhellunfold,itstruckmethatourprivacy-mineandyours—hasalreadydisappeared,notinoneBigBrotherlyblitzkriegbutinLittleBrotherlymoments,bitbybit.
Losingcontrolofyourtelephone,ofcourse,istheleastofit.Afterall.mostofusvoluntarilygiveoutourphonenumberandaddresswhenweallowourselvestobelistedintheWhitePages.Mostofusgoalotfurtherthanthat.Weregisterourwhereaboutswhen-everWeputabankcardinanATMmachineordrivethroughanE-ZPasslaneonthehighway.Wesubmittobeingphotographedeveryday-20timesadayonaverageifyouliveorworkinNewYorkCity-bysurveillancecameras.WemakepublicourinterestsandourpurchasinghabitseverytimeweshopbymailorderorvisitacommercialWebsite.
1.Whatinformationdoyoulearnabouttheauthorthatestablisheshimasanauthorityonthistopic?
A.Hehassufferedalotinlosinghisprivacy.
B.HemakeshislivingoffoftheWeb.
C.Heknowshowtomonitorhisaccount.
D.Heandhiswifepublishedabookconcerningcomputerhackers.
2.Whichofthefollowingproblemshastheauthorexperienced?
A.Someonegotinformationfromhismedicalfilesandsenthimbrochuresonhealthproductshemaywanttobuy.
B.Someoneusedthemotor-vehicleregistrationrecordsonhiscartofindhishomeaddress.
C.Someonereroutedhistelephonecallstoanothernumberwithouthisknowledge.
D.Someonesentane-mailmessagethatdestroyedthefileso