首页 - 网校 - 万题库 - 美好明天 - 直播 - 导航
热点搜索
学员登录 | 用户名
密码
新学员
老学员
您现在的位置: 考试吧 > 考研 > 考研模拟试题 > 考研英语模拟试题 > 考研阅读 > 正文

2015考研英语阅读理解模拟题及答案工学类(37套)

来源:考试吧 2014-10-12 15:48:31 要考试,上考试吧! 考研万题库
2015考研英语阅读理解模拟题及答案工学类(37套),更多2015考研报名时间、2015考研备考指导等信息,请及时关注考试吧考研网或搜索公众微信号“566考研”!

  It is a devastating prospect. Terrorists electronically break into the computers that control the water supply of a large American city, open and close valves to contaminate the water with untreated sewage or toxic chemicals, and then release it in a devastating flood. As the emergency services struggle to respond, the terrorists strike again, shutting down the telephone network and electrical power grid with just a few mouse clicks. Businesses are paralysed, hospitals are overwhelmed and roads are gridlocked as people try to flee.

  This kind of scenario is invoked by doom-mongers who insist that stepping up physical security since the September 11th attacks is not enough. Road-blocks and soldiers around power stations cannot prevent digital terrorism. “Until we secure our cyber-infrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives,” Lamar Smith, a Texas congressman, told a judiciary committee in February. He ended with his catchphrase: “A mouse can be just as dangerous as a bullet or a bomb.” Is he right?

  It is true that utility companies and other operators of critical infrastructure are increasingly connected to the Internet. But just because an electricity company's customers can pay their bills online, it does not necessarily follow that the company's critical control systems are vulnerable to attack. Control systems are usually kept entirely separate from other systems, for good reason. They tend to be obscure, old-fashioned systems that are incompatible with Internet technology anyhow. Even authorised users require specialist knowledge to operate them. And telecoms firms, hospitals and businesses usually have contingency plans to deal with power failures or flooding.

  A simulation carried out in August by the United States Naval War College in conjunction with Gartner, a consultancy, concluded that an “electronic Pearl Harbour” attack on America's critical infrastructure could indeed cause serious disruption, but would first need five years of preparation and $200m of funding. There are far simpler and less costly ways to attack critical infrastructure, from hoax phone calls to truck bombs and hijacked airliners.

  On September 18th Richard Clarke, America's cyber-security tsar, unveiled his long-awaited blueprint for securing critical infrastructure from digital attacks. It was a bit of a damp squib, making no firm recommendations and proposing no new regulation or legislation. But its lily-livered approach might, in fact, be the right one. When a risk has been overstated, inaction may be the best policy.

  It is difficult to avoid comparisons with the “millennium bug” and the predictions of widespread computer chaos arising from the change of date to the year 2000. Then, as now, the alarm was sounded by technology vendors and consultants, who stood to gain from scare-mongering. But Ross Anderson, a computer scientist at Cambridge University, prefers to draw an analogy with the environmental lobby. Like eco-warriors, he observes, those in the security industry——be they vendors trying to boost sales, academics chasing grants, or politicians looking for bigger budgets——have a built-in incentive to overstate the risks.

  Economist; 10/26/2002, Vol. 365 Issue 8296, p19, 3/4p, 1c

  注(1):本文选自Economist;10/26/2002, p19, 3/4p, 1c;

  注(2):本文习题命题模仿对象1999年真题text 2 (1,2,3,5)和2001年真题text 5第3题(4);

  1. We learn from the first paragraph that ____________.

  [A] terrorists could plunge a large American city into chaos through electronic attack

  [B] American people have no experience in dealing with terrorists

  [C] the computer systems of utility companies are rather vulnerable

  [D] the response of emergency services is far from satisfactory

  2. Speaking of the doom-mongers, the author implies that_____________.

  [A] their worries are quite reasonable

  [B] their warnings should be taken seriously

  [C] they exaggerate the threat utility companies are facing

  [D] they are familiar with they way terrorists strike

  3. In the view of Gartner consultant, ___________.

  [A] terrorists may launch another “Pearl Harbor” attack

  [B] terrorists have ample capital and time to prepare a stunning strike

  [C] it is very costly and time-consuming to attack critical infrastructure

  [D] it is unlikely that terrorists would resort to electronic means to attack critical infrastructure

  4.“Lily-livered approach” (Line 4, Paragraph 5) probably means an approach

  characterized by________.

  [A] flexibility

  [B] boldness

  [C] cowardice

  [D] conservatism

  5. We learn from the last paragraph that__________.

  [A] the computer industry suffered heavy loss due to the “millennium bug”

  [B] doom-mongers care more about their own interests than national security

  [C] computer scientists have better judgment than doom-mongers

  [D] environmentalists are criticized for their efforts of protecting environment

  答案:ACDCB

 << 上一页  12 13 14 15 16 17 18 19 20 21  ... 下一页  >> 

  编辑推荐:

  2015年考研网上正式报名入口已开通 点击进入 热点文章

  考试吧提醒:2015年考研十月大事记

  2015年考研政治十大重要考点预测

  2015考研英语阅读理解模拟题及答案汇总

  考试吧考研题库(新增数学三) 智能做题首选 立即体验!

文章搜索
万题库小程序
万题库小程序
·章节视频 ·章节练习
·免费真题 ·模考试题
微信扫码,立即获取!
扫码免费使用
考研英语一
共计364课时
讲义已上传
53214人在学
考研英语二
共计30课时
讲义已上传
5495人在学
考研数学一
共计71课时
讲义已上传
5100人在学
考研数学二
共计46课时
讲义已上传
3684人在学
考研数学三
共计41课时
讲义已上传
4483人在学
推荐使用万题库APP学习
扫一扫,下载万题库
手机学习,复习效率提升50%!
版权声明:如果考研网所转载内容不慎侵犯了您的权益,请与我们联系800@exam8.com,我们将会及时处理。如转载本考研网内容,请注明出处。
官方
微信
扫描关注考研微信
领《大数据宝典》
下载
APP
下载万题库
领精选6套卷
万题库
微信小程序
帮助
中心
文章责编:wuxiaojuan825