欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > DOC文档下载  

    美国法学院入学考试LSAT阅读真题8(含答案) .doc

    • 资源ID:2323084       资源大小:85KB        全文页数:10页
    • 资源格式: DOC        下载积分:8金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要8金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    美国法学院入学考试LSAT阅读真题8(含答案) .doc

    美国法学院入学考试LSAT阅读真题8(含答案)SECTION ITime 35 minutes 26 QuestionsDirections: Each passage in this section is followed by a group of questions to be answered on the basis of what is stated or implied in the passage. For some of the questions, more than one of the choices could conceivably answer the question. However, you are to choose the best answer, that is, the response that most accurately and completely answers the question, and blacken the corresponding space on your answer sheet.Most office workers assume that the messages they send to each other via electronic mail are as private as a telephone call or a face-to-face meeting. That assumption is wrong. Although it is illegal in many areas for an employer to eavesdrop on private conversations or telephone callseven if they take place on a company-owned telephonethere are no clear rules governing electronic mail. In fact, the question of how private electronic mail transmissions should be has emerged as one of the more complicated legal issues of the electronic age.Peoples opinions about the degree of privacy that electronic mail should have vary depending on whose electronic mail system is being used and who is reading the messages. Does a government office, for example, have the right to destroy electronic messages created in the course of running the government, thereby denying public access to such documents? Some hold that government offices should issue guidelines that allow their staff to delete such electronic records, and defend this practice by claiming that the messages thus deleted already exist in paper versions whose destruction is forbidden. Opponents of such practices argue that the paper versions often omit such information as who received the messages and when they received them, information commonly carried on electronic mail systems. Government officials, opponents maintain, are civil servants; the public should thus have the right to review any documents created during the conducting of government business.Questions about electronic mail privacy have also arisen in the private sector. Recently, two employees of an automotive company were discovered to have been communicating disparaging information about their supervisor via electronic mail. The supervisor, who had been monitoring the communication, threatened to fire the employees. When the employees filed a grievance complaining that their privacy had been violated, they were let go. Later, their court case for unlawful termination was dismissed; the companys lawyers successfully argued that because the company owned the computer system, its supervisors had the right to read anything created on it.In some areas, laws prohibit outside interception of electronic mail by a third party without proper authorization such as a search warrant. However, these laws do not cover “inside” interception such as occurred at the automotive company. In the past, courts have ruled that interoffice communications may be considered private only if employees have a “reasonable expectation” of privacy when they send the messages. The fact is that no absolute guarantee of privacy exists in any computer system. The only solution may be for users to scramble their own messages with encryption codes; unfortunately, such complex codes are likely to undermine the principal virtue of electronic mail: its convenience.1. Which one of the following statements most accurately summarizes the main point of the passage?(A) Until the legal questions surrounding the privacy of electronic mail in both the public and private sectors have been resolved, office workers will need to scramble their electronic mail messages with encryption codes.(B) The legal questions surrounding the privacy of electronic mail in the work place can best be resolved by treating such communications as if they were as private as telephone conversations or face-to-face meetings.(C) Any attempt to resolve the legal questions surrounding the privacy of electronic mail in the workplace must take into account the essential difference between public-sector and private sector business.(D) At present, in both the public and private sectors, there seem to be no clear general answers to the legal questions surrounding the privacy of electronic mail in the workplace.(E) The legal questions surrounding the privacy of electronic mail in the workplace of electronic mail in the workplace can best be resolved by allowing supervisors in public-sector but not private-sector offices to monitor their employees communications.2. According to the passage, which one of the following best expresses the reason some people use to oppose the deletion of electronic mail records at government offices?(A) Such deletion reveals the extent of governments unhealthy obsession with secrecy.(B) Such deletion runs counter to the notion of governments accountability to its constituency.(C) Such deletion clearly violates the legal requirement that government offices keep duplicate copies of all their transactions.(D) Such deletion violates the governments own guidelines against destruction of electronic records.(E) Such deletion harms relations between government employees and their supervisors.3. Which one of the following most accurately states the organization of the passage?(A) A problem is introduced, followed by specific examples illustrating the problem: a possible solution is suggested, followed by an acknowledgment of its shortcomings.(B) A problem is introduced, followed by explications of two possible solutions to the problem: the first solution is preferred to the second, and reasons are given for why it is the better alternative.(C) A problem is introduced, followed by analysis of the historical circumstances that helped bring the problem about a possible solution is offered and rejected as being only a partial remedy.(D) A problem is introduced, followed by enumeration of various questions that need to be answered before a solution can be found: one possible solution is proposed and argued for.(E) A problem is introduced, followed by descriptions of two contrasting approaches to thinking about the problem: the second approach is preferred to the first, and reasons are given for why it is more likely to yield a successful solution.4. Based on the passage, the authors attitude towards interception of electronic mail can most accurately be described as:(A) outright disapproval of the practice(B) support for employers who engage in it(C) support for employees who lose their jobs because of it(D) intellectual interest in its legal issues(E) cynicism about the motives behind the practice5. It can be inferred from the passage that the author would most likely hold which one of the following opinions about an encryption system that could encodes and decode electronic mail messages with a single keystroke?(A) It would be an unreasonable burden on a companys ability to monitor electronic mail created by its employees.(B) It would significantly reduce the difficulty of attempting to safeguard the privacy of electronic mail.(C) It would create substantial legal complications for companies trying to prevent employees from revealing trade secrets to competitors.(D) It would guarantee only a minimal level of employee privacy, and so would not be worth the cost involved in installing such a system.(E) It would require a change in the legal definition of “reasonable expectation of privacy” as it applies to employer-employee relations.6. Given the information in the passage, which one of the following hypothetical events is LEAST likely to occur?(A) A court rules that a government offices practice of deleting its electronic mail is not in the publics best interests.(B) A private-sector employer is found liable for wiretapping an office telephone conversation in which two employees exchanged disparaging information about their supervisor.(C) A court upholds the right of a government office to destroy both paper and electronic versions of its in-house documents.(D) A court upholds a private-sector employers right to monitor messages sent between employees over the companys in-house electronic mail system.(E) A court rules in favor of a private-sector employee whose supervisor stated that in-house electronic mail would not be monitored but later fired the employee for communicating disparaging information via electronic mail.7. The authors primary purpose in writing the passage is to(A) demonstrate that the individual right to privacy has been eroded by advances in computer technology(B) compare the legal status of electronic mail in the public and private sectors(C) draw an extended analogy between the privacy of electronic mail and the privacy of telephone conversations or face-to-face meeting(D) illustrate the complexities of the privacy issues surrounding electronic mail in the workplace(E) explain why the courts have not been able to rule definitely on the issue of the privacy of electronic mail参考答案:1-7  DBADBCDWhile a new surge of critical interest in the ancient Greek poems conventionally ascribed to Homer has taken place in the last twenty years or so, it was nonspecialists rather than professional scholars who studied the poetic aspects of the Iliad and the Odyssey between, roughly, 1935 and 1970. During these years, while such nonacademic intellectuals as Simone Weil and Erich Auerbach were trying to define the qualities that made these epic accounts of the Trojan War and its aftermath great poetry, the questions that occupied the specialists were directed elsewhere: “Did the Trojan War really happen?” “Does the bard preserve Indo-European folk memories?” “How did the poems get written down?” Something was driving scholars away from the actual works to peripheral issues. Scholars produced books about archaeology, about gift-exchange in ancient societies, about the development of oral poetry, about virtually anything except the Iliad and the Odyssey themselves as unique reflections or distillations of life itselfas, in short, great poetry. The observations of the English poet Alexander Pope seemed as applicable in 1970 as they had been when he wrote them in 1715: according to Pope, the remarks of critics “are rather Philosophical, Historical, Geographicor rather anything than Critical and Poetical.”Ironically, the modern manifestation of this “nonpoetical” emphasis can be traced to the profoundly influential work of Milman Parry, who attempted to demonstrate in detail how the Homeric poems, believed to have been recorded nearly three thousand years ago, were the products of a long and highly developed tradition of oral poetry about the Trojan War. Parry proposed that this tradition built up its diction and its content by a process of constant accumulation and refinement over many generations of storytellers. But after Parrys death in 1935, his legacy was taken up by scholars who, unlike Parry, forsook intensive analysis of the poetry itself and focused instead on only one element of Parrys work: the creative limitations and possibilities of oral composition, concerning on fixed elements and inflexibilities, focusing on the things that oral poetry allegedly can and cannot do. The dryness if this kind of study drove many of the more inventive scholars away from the poems into the rapidly developing field of Homers archaeological and historical background.Appropriately, Milman Parrys son Adam was among those scholars responsible for a renewed interest in Homers poetry as literary art. Building on his fathers work, the younger Parry argued that the Homeric poems exist both within and against a tradition. The Iliad and the Odyssey were, Adam Parry thought, the beneficiaries of an inherited store of diction, scenes, and at the same time highly individual works that surpasses these conventions. Adam Parry helped prepare the ground for the recent Homeric revival by affirming his fathers belief in a strong inherited tradition, but also by emphasizing Homers unique contributions within that tradition.8. Which one of the following best states the main idea of the passage?(A) The Homeric poems are most fruitfully studied as records of the time and place in which they were written.(B) The Homeric poems are the products of a highly developed and complicated tradition of oral poetry.(C) The Homeric poems are currently enjoying a resurgence of critical interest after an age of scholarship largely devoted to the poems nonpoetic elements.(D) The Homeric poems are currently enjoying a resurgence of scholarly interest after am age during which most studies were authored by nonacademic writers.(E) Before Milman Parry published his pioneering work in the early twentieth century, it was difficult to assign a date or an author to the Homeric poems.9. According to the passage, the work of Simone Weil and Erich Auerbach on Homer was primarily concerned with which one of the following?(A) considerations of why criticism of Homer had moved to peripheral issues(B) analyses of the poetry itself in terms of its literary qualities(C) studies in the history and nature of oral poetry(D) analyses of the already ancient epic tradition inherited by Homer(E) critiques of the highly technical analyses of academic critics10. The passage suggests which one of the following about scholarship on Homer that has appeared since 1970?(A) It has dealt extensively with the Homeric poems as literary art.(B) It is more incisive than the work of the Parrys.(C) It has rejected as irrelevant the scholarship produced by specialists between 1935 and 1970.(D) It has ignored the work of Simone Weil and Erich Auerbach.(E) It has attempted to confirm that the Iliad and the Odyssey were written by Homer.11. The author of the passage most probably quotes Alexander Pope (lines 24-26) in order to(A) indicate that the Homeric poems have generally received poor treatment at the hands of English critics(B) prove that poets as well as critics have emphasized elements peripheral to the poems(C) illustrate that the nonpoetical emphasis also existed in an earlier century(D) emphasize the problems inherent in rendering classical Greek poetry into modern English(E) argue that poets and literary critics have seldom agreed the interpretation of poetry12. According to the passage, which one of the following is true of Milman Parrys immediate successors in the field of Homeric studies?(A) They reconciled Homers poetry with archaeological and historical concerns.(B) They acknowledged the tradition of oral poetry, but focused on the uniqueness of Homers poetry within the tradition.(C) They occupied themselves with the qu

    注意事项

    本文(美国法学院入学考试LSAT阅读真题8(含答案) .doc)为本站会员(仙人指路1688)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开