题目内容

Who is considered as an initiator of the "stream of consciousness" literature in the 20th century

A. [A] John Galsworthy. [B] Virginia Woolf.
B. [C] Henry James. [D] T. S. Eliot.

查看答案
更多问题

Frederic Chopin was born in Zelazowa Wola, Poland, on February 22, 1810, to a French father and Polish mother. His father, Nicholas Chopin, was a French tutor to many aristocratic Polish families, later accepting a position as a French teacher at the Warsaw Lyceum. Chopin composed "Ballade in F Minor" most probably in [A] Poland. [B] France. [C] Scotland. [D] Vienna.

Although Chopin later attended the Lyceum where his father taught, his early training began at home. This included receiving piano lessons from his mother. By the age of six, Chopin was creating original pieces, showing innate prodigious musical ability. His parents arranged for the young Chopin to take piano instruction from Wojciech Zywny.
B. When Chopin was sixteen, he attended the Warsaw Conservatory of Music, directed by composer Joseph Elsner. Elsner, like Zywny, insisted on the traditional training associated with Classical music but allowed his students to investigate the more original imaginations of the Romantic style as well.As often happened with the young musicians of both the Classical and Romantic Periods, Chopin was sent to Vienna, the unquestioned center of music for that day. He gave piano concerts and then arranged to have his pieces published by a Viennese publishing house there. While Chopin was in Austria, Poland and Russia faced off in the apparent beginnings of war. He returned to Warsaw to get his things in preparation of a more permanent move. while there, his friends gave him a silver goblet filled with Polish soil. He kept it always, as he was never able to return to his beloved Poland.
C. French by heritage, and desirous of finding musical acceptance from a less traditional audience than that of Vienna, Chopin ventured to Paris. Interestingly, other young musicians had assembled in the city of fashion with the very same hope. Chopin joined Franz Liszt, Hector Berlioz, Vincenzo Bellini, all proponents of the "new" Romantic style.Although Chopin did play in the large concert halls on occasion, he felt most at home in private settings, enjoying the social milieu that accompanied concerts for the wealthy. He also enjoyed teaching, as this caused him less stress than performing. Chopin did not feel that his delicate technique and intricate melodies were as suited to the grandiose hall as they were to smaller environments and audiences.
D. News of the war in Poland inspired Chopin to write many sad musical pieces expressing his grief for "his" Poland. Among these was the famous "Revolutionary Etude." Plagued by poor health as well as his homesickness, Chop in found solace in summer visits to the country. Here, his most complex yet harmonic creations found their way to the brilliant composer’s hand. The "Fantasia in F Minor," the "Barcarolle," the "Polonaise Fantasia," "Ballade in A Flat Major," "Ballade in F Minor," and "Sonata in B Minor" were all products of the relaxed time Chopin enjoyed in the country.As the war continued in Warsaw and then reached Paris, Chopin retired to Scotland with friends. Although he was far beyond the reach of the revolution, his melancholy attitude did not improve and he sank deeper into a depression. Likewise, his health did not rejuvenate either. A window in the fighting made it possible for Chopin to return to Paris as his health deteriorated further. Surrounded by those that he loved, Frederic Francois Chopin died at the age of 39. He was buried in Paris.
E. Chopin’s last request was that the Polish soil in the silver goblet be sprinkled over his grave.

The communications explosion is on the scale of the rail, automobile or telephone revolution. Very soon you’ll be able to record your entire life (1) —anything a microphone or a camera can sense you’ Il be able to (2) . In particular, the number of images a person captures in a lifetime is set to rise exponentially. The thousand (3) a year I take of my children on a digital camera are all precious to me. (4) a generation’ s time, my children’ s children will have total image documentation of their entire lives—a (5) log of tremendous personal value.By then we’ll be wrestling with another question: how we control all the electronic (6) connected to the internet: trillions of PCs, laptops, cell phones and other gadgets. In Cambridge, we’re already working (7) millimetre-square computing and sensing devices that can be linked to the internet through the radio network. This sort of (8) will expand dramatically (9) microscopic communications devices become dirt-cheap and multiply. Just imagine (10) the paint on the wall could do if it had this sort of communications dust in it: change colour, play music, show movies or even speak to you.(11) costs raise other possibilities too. (12) launching space vehicles is about to become very much cheaper, the number of satellites is likely to go up exponentially. There’ s lots of (13) up there so we could have millions of them. And if you have millions of loworbit satellites, you can establish a (14) communications network that completely does away with towers and masts. If the satellites worked on the cellular principle so you got spatial reuse of frequencies, system (15) would be amazing. Speech is so (16) that I expect voice communication to become almost free eventually: you’ 11 pay just a monthly fixed (17) and be able to make as many calls as you want. By then people will also have fixed links with business (18) , friends and relatives. One day I (19) being able to keep in touch with my family in Poland on a fibreoptic audio-video (20) ; we’ll be able to have a little ceremony at supper-time, open the curtains and sit down "together" to eat. Read the following text. Choose the best word (s) for each numbered blank and mark A, B, C or D on ANSWER SHEET 1.10()

A. what
B. that
C. which
D. as

The novel ______ by Samuel Richardson is considered the first English psycho-analytical novel.

A. Pamela
B. Robinson Crusoe
C. Jonathan Wild
D. Amelia

People do not have secret trolleys at the supermarket, so how can it be a violation of their privacy if a grocer sells their purchasing habits to a marketing firm If they walk around in public view, what harm can cameras recording their movements cause A company is paying them to do a job, so why should it not read their e-mails when they are at work How, what and why, indeed. Yet, in all these situations, most people feel a sense of unease. The technology for gathering, storing, manipulating and sharing information has become part of the scenery, but there is little guidance on how to resolve the conflicts created by all the personal data now washing around. "Contravene" in the third paragraph is closest in meaning to [A] violated. [B] renounced. [C] conceded. [D] released.

A group of computer scientists at Stanford University, led by John. Mitchell, has started to address the problem in a novel way. Instead of relying on rigid (and easily programmable) codes of what is and is not acceptable, Dr. Mitchell and his colleagues Adam Barth and Anupam Datta have turned to a philosophical theory called contextual integrity. This theory acknowledges that people do not require complete privacy. They will happily share information with others as long as certain social norms are met. Only when these norms are contravened--for example, when your psychiatrist tells the personnel department all about your consultation--has your privacy been invaded. The team think contextual integrity can be used to express the conventions and laws surrounding privacy in the formal vernacular of a computer language.
B. Contextual integrity, which was developed by Helen Nissenbaum of New York University, relies on four classes of variable. These are the context of a flow of information, the capacities in which the individuals sending and receiving the information are acting, the types of information involved, and what she calls the "principle of transmission".
C. It is the fourth of these variables that describes the basis on which information flows. Someone might, for example, receive information under the terms of a commercial exchange, or because he deserves it, or because someone chose to share it with him, or because it came to him as a legal right, or because he promised to keep it secret. These are all examples of transmission principles.
Dr. Nissenbaum has been working with Mr. Barth to turn these wordy descriptions of the variables of contextual integrity into formal expressions that can be incorporated into computer programs. The tool Mr. Barth is employing to effect this transition is linear temporal logic, a system of mathematical logic that can express detailed constraints on the past and the future.
E. Linear temporal logic is an established discipline. It is, for example, used to test safety critical systems, such as aeroplane flight controls. The main difference between computer programs based on linear temporal logic and those using other sorts of programming language is that the former describe how the world ought to be, whereas the latter list specific instructions for the computer to carry out in order to achieve a particular end. The former say something like: "If you need milk, you ought eventually to arrive at the shop. "The latter might say: "Check the refrigerator. If there is no milk, get in your car. Start driving. Turn left at the corner. Park. Walk into the shop."
F. Dr. Mitchell and his team have already written logical formulae that they believe express a number of American privacy laws, including those covering health care, financial institutions and children’s activities online. The principles of transmission can be expressed in logical terms by using concepts such as "previously" and "eventually" as a type of mathematical operator. (They are thus acting as the equivalents of the "plus", "minus", " multiply" and "divide" signs in that more familiar system of logic known as arithmetic.) For example, the Gramm-Leaeh-Bliley act states that "a financial institution may not disclose personal information, unless such financial institution provides or has provided to the consumer a notice. "This is expressed as:
G. IF send (financial-institution, third-party, personal-information)
H. THEN PREVIOUSLY send (financial-institution, consumer, notification)
I. OR EVENTUALLY send (financial-institution, consumer, notification)According to Dr. Nissenbaum, applying contextual integrity to questions of privacy not only results in better handling of those questions, but also helps to pinpoint why new methods of gathering information provoke indignation. In a world where the ability to handle data is rapidly outpacing agreement about how that ability should be used, this alone is surely reason to study it.

答案查题题库