手机版

浙江大学 2007年 攻读博士研究生入学考试题(6)

发布时间:2021-06-05   来源:未知    
字号:

Since the early 1930s, Swiss banks hand 36. A. resisted prided themselves on their system of banking secrecy and numbered accounts. Over the years, they had successfully C. withstood 37. A. in turn C. in case

B. endured D. opposed B. in return D. in all B. possessors D. holders B. while D. therefore B. irresponsible D. irrational

__36__ every challenge to this system by 38. A. owners their own government who, __37__, had been frequently urged by C. keepers

foreign 39. A. that C. which

governments to reveal information about

the financial affairs of certain account 40.A.disrespectful __38__. The result of this policy of secrecy was __39__ a kind of mystique had grown up around Swiss banking. 41.A.about There was a widely-held belief that Switzerland was __40__ to wealthy C. after C. irresistible

B. of D. for

foreigners, mainly because of its numbers 42. A. Contributed accounts and bankers’ reluctance to ask awkward questions__41__ depositors. C. Contributing

B. Having contributed D. contributed

__42__ to the mystique was the view that if this secrecy was ever give up, foreigners 43.A. exchange was fall over themselves in the rush C. deposit B. withdraw D. cash B. as a matter of act C. therefore D. of co

urse B. blue D. blew B. pretext D. contract B. to have prevented D. to prevent

to__43__ money, and the Swiss banking 44. A. nevertheless system would virtually collapse overnight. To many, __44__, it came like a bolt

out of the __45__, when, in 1977, the 45.A. shock Swiss banks announced they had signed a C. sudden

__46__ with the Swiss National Banks (the 46. A. pact Center Bank). The aim of the agreement C. proviso

was __47__ the improper use of the 47.A. prevent country’s banks secrecy laws, and its7

C. preventing

Section Ⅳ Reading Comprehension (20 marks, 1 mark each)

Directions: There are 4 passages in this part. Each passages is followed by some questions or unfinished statements. For each of them there are four choices marked A, B, C and D. You should decide on the best choice and mark the corresponding letter on Answer Sheet 1 with a single line through the center.

Passage 1

Computers have aided in the study of humanities for almost as long as the machines have existed. Decades ago, when the technology consisted solely of massive, number-crunching mainframe computers, the chief liberal arts applications were in compiling statistical indexes of works of literature.

Mainframe computers helped greatly in the highly laborious task, which dates back to the Renaissance, of cataloging each reference of a particular word in a particular work. Concordances help scrutinize important texts for patterns and meaning. Other humanities applications for computers in this early era of technology included compiling dictionaries, especially for foreign or antiquated languages, and cataloging library collections.

Such types of computer usage in the humanities may seem limited at first, but they have produced some interesting results in the last few years and promise to continue to do so. As compute use and access have grown, so has the number of digitized texts of classic literary works.

The computer-based study of literary texts has established its own niche in academia. Donald Foster, an English professor at Vassar College in Poughkeepsie, New York, is one of the leaders in textual scholarship. In the late 1980’s Foster created SHAXICON, a database that tracks all the ―rare‖ words used by English playwright William Shakespeare. Each of these words appears in any individual Shakespeare play no more than 12 times. The words can then be cross-referenced with some 2,000 other poetic texts, allowing experienced researchers to explore when they were written, who wrote them, how the author was influenced by the works of other writers, and how the texts changed as they were reproduced over the centuries.

In late 1995 Foster’s work attracted widespread notice when he claimed that Shakespeare was the anonymous author of an obscure 578-line poem, A Funeral Elegy (1612). Although experts had made similar claims for other works in the past, Foster gained the backing of a number of prominent scholars because of his computer-based approach. If Foster’s claim holds up to long-term judgment, the poem will be one of the few additions to the Shakespearean canon in the last 100 years.

Foster’s work gained further public acclaim and validation when he was asked

浙江大学 2007年 攻读博士研究生入学考试题(6).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
×
二维码
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)