2011年考研英語二試題難度有所提高

  Routers配置     |      2023-03-24 02:59

  2011年考研英語已經結束,英語二是改革以來的第二次考試,難度較之去年稍有提高。就各部分來說,第一部分完形填空難度較之去年有所降低,涉及的是一篇社會類的文章。閱讀理解A部分對考生的詞匯量要求有所提高,專業性也較強,相比于2010年來說,今年閱讀理解的文章和題目在難度方面有所增加。B部分新題型是以多項對應的形式出現。第三部分翻譯難度與去年持平,涉及的是環境方面的話題。最后一部分小作文是常見的書信形式,要求寫一封祝賀加建議信;大作文也是考綱規定的圖表作文,作文部分難度都不是很大。

  第一部分:完形填空

  文章是取自New York Times(《紐約時報》)2010年7月3日,原文標題為Taking the Mystery Out of Web Anonymity(揭開網絡匿名的面紗)。文章探討的是網絡匿名這一現象給美國社會帶來的一系列嚴重后果,政府決定采取一些措施來解決這個問題。詞匯、固定搭配這是傳統的兩大考點,此外也側重于對文章意思的理解??忌獙W會分析句內和句際的邏輯關系以及篇章內容。

  點擊查看原文:

  Taking the Mystery Out of Web Anonymity

  THE Obama Administration is trying to fix the Internet’s dog problem。

  The problem, as depicted in Peter Steiner’s legendary 1993 New Yorker cartoon, is that on the Internet nobody knows you’re a dog. And thus the enduring conundrum over who can be trusted in cyberspace。

  The Internet affords anonymity to its users — a boon to privacy and freedom of speech. But that very anonymity is also behind the explosion of cybercrime that has swept across the Web。

  Can privacy be preserved while bringing a semblance of safety and security to a world that seems increasingly lawless?

  Last month, Howard Schmidt, the nation’s cyberczar, offered the Obama administration’s proposal to make the Web a safer place — a “voluntary trusted identity” system that would be the high-tech equivalent of a physical key, a fingerprint and a photo ID card, all rolled into one. The system might use a smart identity card, or a digital credential linked to a specific computer, and would authenticate users at a range of online services。

  The idea is to create a federation of private online identity systems. Users could select which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require a government-issued Internet driver’s license. (Civil liberties groups oppose a government system, fearful that it could lead to national identity cards。)

  Google and Microsoft are among companies that already have these “single sign-on” systems that make it possible for users to log in just once but use many different services。

  In effect, the approach would create a “walled garden” in cyberspace, with (virtually) safe neighborhoods and bright (cyber) streetlights to establish a sense of a trusted community。

  Mr. Schmidt described it as a “voluntary ecosystem” in which “individuals and organizations can complete online transactions with confidence, trusting the identities of each other and the identities of the infrastructure that the transaction runs on?!?/p>

  Still, the administration’s plan has divided privacy rights activists. Some applaud the approach; others are apprehensive. “It seems clear,” Lauren Weinstein, the editor of Privacy Journal, wrote “that such a scheme is a pre-emptive push toward what would eventually be a mandated Internet ‘driver’s license’ mentality?!?/p>

  The plan has also been greeted with skepticism by some computer security experts, who worry that the “voluntary ecosystem” envisioned by Mr. Schmidt would still leave much of the Internet vulnerable. They argue that all Internet users should be forced to register and identify themselves, in the same way that drivers must be licensed to drive on public roads。

  “The privacy standards the administration wants to adopt will make the system both unwieldy and less effective and not good for security,” said Stewart Baker, a former chief counsel of the National Security Agency who favors government-issued Internet driver’s licenses。

  But Marc Rotenberg, executive director of the Electronic Privacy Information Center, a privacy rights group, said such criticism was unfair. He said the Obama administration had created a policy framework that will make it possible for private industry to improve privacy and security technologies。

  Some members of the Internet’s technical community say that the Web-of-trust approach is too little, too late to solve the Internet’s security problems. The problem is no longer just about cyberspace stalkers, thieves and con artists, but about the trustworthiness of the very fabric of the network itself。