con_law_scalia_a_matter_of_interpretation

合集下载

申辩英文怎么写

申辩英文怎么写

申辩英文怎么写申辩英文可以按照以下结构进行写作:1. Introduction:- State the purpose of your letter/communication: I am writing to offer my defense/response to [the accusation/situation/incident].2. Explanation/Defense:- Provide a clear and concise explanation of the situation/incident and your side of the story.- Present any evidence or facts that support your claim and refute the accusation.- Address any misunderstandings or misinterpretations that may have occurred.- Use a respectful and rational tone throughout your explanation.3. Acknowledge and Address Counterarguments:- Anticipate the possible counterarguments or doubts the reader may have.- Address each counterargument individually and provide a logical response for each one.- Use credible sources or evidence to back up your response.4. Express Contrition (if necessary):- If there is any truth to the accusation or situation, express your regret and willingness to rectify the issue.- Offer possible solutions or steps you have taken or plan to take to resolve the problem.5. Conclusion:- Summarize your defense and restate your position clearly.- Express your hope for a fair and unbiased consideration of the situation.- Thank the reader for their time and consideration.6. Closing:- Use an appropriate closing remark, such as "Sincerely," or "Yours faithfully/faithfully".- Sign off with your name and any relevant contact information, if necessary.Here is an example of how a defense letter could be written:Dear [Recipient's Name],I am writing to offer my defense in response to the accusation made against me on [date] regarding [briefly state the accusation/incident]. I appreciate the opportunity to address this matter and provide my perspective.Firstly, I want to clarify the circumstances surrounding the incident. On the day in question, I was not present at the location where the alleged events occurred. I have verified my alibi with relevant witnesses, who can testify that I was elsewhere at the time. Furthermore, I have attached documentary evidence, such as security camera footage, which supports my claim of innocence.Additionally, I would like to address certain misconceptions that seem to have arisen from this situation. It appears that there may have been a misunderstanding or miscommunication regarding my actions. I was not aware of the specific rules or guidelines that were applicable at the time, and I would appreciate the opportunity to rectify any errors or gaps in my knowledge.Furthermore, I am aware that some doubts may have arisen concerning my credibility. I want to assure you that I hold myself to the higheststandards of integrity and professionalism. I understand the importance of trust in my position, and I have always strived to act in an ethical manner.Lastly, I want to express my deep regret for any inconvenience or misunderstanding that may have resulted from this situation. It was certainly not my intention to cause any harm or disrespect. I am committed to remedying the situation and taking necessary steps to ensure it does not occur again in the future.In conclusion, I respectfully request that you review the evidence and information provided in my defense. I believe it will be clear that the allegations made against me are unfounded. I appreciate your fair and unbiased consideration of this matter.Thank you for your attention to this letter. If you require any further information or clarification, please feel free to contact me at [phone number/email address].Sincerely,[Your Name]。

欧拉方法课件

欧拉方法课件

yi
1 2 h[ f (xi , yi )
f ( xi1 , yi1 )]
隐式措施
这种只用前一步 yi 即可算出 yi1 的公式称为单步法.
显式旳单步法能够逐层求解,简朴以便;
隐式旳单步法需要解具有 yi1 旳方程式,很不以便,
常用迭代法求解。
隐式措施旳迭代求解
梯形措施:
1 yi1 yi 2 h [ f ( xi , yi ) f ( xi1 , yi1 )]
第四步,将差分方程改写为线性方程组旳形式并求 解,解出 yi .
第五步,从理论上研究数值格式旳局部截断误差(即 相容性)、稳定性以及收敛性与整体误差。
第六步,分析数值成果与理论分析是否一致,考察 有无不足及可改善线法)
第一步,对问题(*)旳求解区域作一致网格剖分,
即 yi1 yi h f ( xi , yi ), i 0, 1, n 1.
总旳, yi1 yi h f ( xi , yi ), i 0, 1, n 1.
y0 y( x0 ).
这就是著名旳欧拉(Euler)公式。 以上措施称为欧拉措施或欧拉折线法。
欧拉折线法名称旳由来: yi1 yi h f ( xi , yi ), i 0, 1, n 1.
证:此定理旳证明可在一般旳《常微分方程》教材 上找到,故略。
2.求解问题(*)数值措施旳基本思想
求解问题(*)数值措施旳基本思想是在求解区域 I
上任取 n 1个节点 a x0 x1 x2 xn b ,
在这些节点上采用离散化措施(一般用数值积分、微 分、泰勒公式等)将上述初值问题化成有关离散变量
(xi ,
yi )
yi
h( yi
2xi yi
),

自考高级英语试题及答案

自考高级英语试题及答案

自考高级英语试题及答案一、选择题(每题2分,共20分)1. The word "abandon" is most likely to be found in which part of a dictionary?A) PrefaceB) AppendixC) GlossaryD) Index答案:D2. Which of the following is NOT a characteristic of a narrative text?A) Chronological orderB) Descriptive languageC) Personal anecdotesD) Objective reporting答案:D3. In a persuasive essay, the writer's main goal is to:A) Inform the readerB) Entertain the readerC) Persuade the readerD) Criticize the reader答案:C4. The phrase "break the ice" means:A) To stop a conversationB) To start a conversationC) To change the subjectD) To end a conversation答案:B5. Which of the following is a formal way to address a letter?A) Dear Sir/MadamB) Hi thereC) HelloD) Hey答案:A6. The correct use of the verb "to be" in the sentence "The book is on the table" is as:A) A linking verbB) A transitive verbC) An intransitive verbD) A causative verb答案:A7. The term "hyperbole" refers to:A) A figure of speech that uses exaggeration for emphasisB) A figure of speech that uses understatement for emphasisC) A figure of speech that uses repetition for emphasisD) A figure of speech that uses irony for emphasis答案:A8. Which of the following is a synonym for "meticulous"?A) CarelessB) ImpatientC) PreciseD) Reckless答案:C9. The phrase "a shot in the dark" means:A) A random guessB) A well-planned actionC) A certain successD) A well-aimed shot答案:A10. In English grammar, the term "subjunctive mood" is used to describe:A) A hypothetical situationB) A past eventC) A future eventD) A present event答案:A二、填空题(每题2分,共20分)1. The word "____" can be used to describe a person who is very organized and efficient.答案:meticulous2. The phrase "____" is used to describe a situation where someone is trying to find out information without being obvious.答案:fishing for information3. The word "____" is used to describe a person who is very talkative and likes to tell stories.答案:garrulous4. The phrase "____" is used to describe a situation where someone is not showing their true feelings or intentions. 答案:wearing a mask5. The word "____" is used to describe a person who is very careful and cautious.答案:prudent6. The phrase "____" is used to describe a situation where someone is trying to make a difficult decision.答案:caught between a rock and a hard place7. The word "____" is used to describe a person who is very creative and imaginative.答案:inventive8. The phrase "____" is used to describe a situation where someone is trying to make something appear better than it really is.答案:putting a good face on it9. The word "____" is used to describe a person who is very secretive and does not share information easily.答案:reticent10. The phrase "____" is used to describe a situation where someone is trying to make a difficult decision.答案:on the horns of a dilemma三、阅读理解(每题5分,共30分)阅读以下短文,然后回答问题。

思考问题英语作文

思考问题英语作文

When tasked with writing an essay in English on the topic of thinking about problems,its important to approach the subject with a clear structure and a thoughtful perspective.Heres a detailed guide on how to write such an essay,including key points to consider and examples to illustrate your ideas.Title:The Art of ProblemSolving:A Reflection on Critical ThinkingIntroduction:Begin your essay by introducing the importance of problemsolving in our daily lives. You might mention how problemsolving is a fundamental skill that everyone needs, whether in personal relationships,academic settings,or professional environments.Example:In a world that is constantly evolving,the ability to think critically and solve problems is more crucial than ever.It is the cornerstone of innovation,the driving force behind progress,and the key to navigating the complexities of life.Body Paragraph1:Understanding the ProblemDiscuss the first step in problemsolving:understanding the problem at hand.Explain how clarity is essential before attempting to find a solution.Key Points:The need for a clear definition of the problem.The importance of gathering all relevant information.The role of empathy in understanding problems,especially in interpersonal situations.Example:Before one can begin to tackle a problem,it is imperative to have a comprehensive understanding of what the problem actually is.This involves not only identifying the issue but also understanding its root causes and the context in which it arises.Body Paragraph2:Analyzing the ProblemTalk about the process of analyzing the problem.Highlight the importance of breaking down the problem into smaller,manageable parts.Key Points:The benefits of breaking down complex issues.The use of logical reasoning and critical analysis.The role of creativity in finding unconventional solutions.Example:Once the problem is clearly defined,the next step is to analyze it.This involves dissecting the issue into its constituent parts,which can often reveal underlying patterns or connections that might not be immediately apparent.Body Paragraph3:Generating SolutionsDiscuss the brainstorming process and the generation of potential solutions.Emphasize the importance of considering multiple perspectives and ideas.Key Points:The value of brainstorming and collaboration.The need to consider a range of possible solutions.The importance of evaluating the feasibility and effectiveness of each solution.Example:With a thorough understanding and analysis of the problem,the next phase is to generate potential solutions.This is where creativity and innovation come into play,as one considers a variety of approaches to address the issue at hand.Body Paragraph4:Evaluating and Implementing SolutionsTalk about the process of evaluating the proposed solutions and selecting the most effective one.Discuss the implementation process and the potential challenges that may arise.Key Points:The criteria for evaluating solutions.The importance of testing solutions in a controlled environment.The challenges of implementation and the need for adaptability.Example:After generating a range of potential solutions,the task of evaluation begins.This involves assessing each solution based on its feasibility,effectiveness,and alignment with the original problem statement.Conclusion:Summarize the importance of critical thinking in problemsolving.Reflect on how this skill can be developed and improved over time.Example:In conclusion,the process of problemsolving is a testament to the power of criticalthinking.It is a skill that can be honed and refined,allowing individuals to navigate the challenges of life with greater confidence and effectiveness.Final Thoughts:Encourage readers to reflect on their own problemsolving experiences and consider how they can apply the principles discussed in the essay to their own lives.Example:As we continue to face new challenges in our personal and professional lives,let us remember the importance of thinking critically about the problems we encounter.By doing so,we not only find solutions but also grow as individuals in the process.。

法律英语试卷试题及答案

法律英语试卷试题及答案

法律英语试卷试题及答案一、选择题(每题2分,共20分)1. Which of the following is not a legal term?A. ContractB. TortC. EquityD. Agreement2. The term "pro se" refers to a person who represents themselves in a legal proceeding without the assistance of an attorney. True or False?3. What does the abbreviation "LLC" stand for in the context of business law?A. Limited Liability CompanyB. Large Legal ContractC. Local Legal CouncilD. Legal Liability Certificate4. Which of the following is a type of legal document?A. MemorandumB. Memorandum of Understanding (MOU)C. Both A and BD. Neither A nor B5. The principle of "stare decisis" is most closely associated with which legal system?A. Civil lawB. Common lawC. Religious lawD. International law6. What is the term for the legal process of resolving disputes outside the court system?A. LitigationB. MediationC. ArbitrationD. Negotiation7. In the context of intellectual property law, "patent" refers to:A. A right to exclude others from making, using, or selling an inventionB. A document that grants ownership of a work of literature or artC. A legal document that protects a brand name or logoD. A license to practice a profession8. Which of the following is a fundamental principle of criminal law?A. Presumption of innocenceB. Right to a fair trialC. Both A and BD. Neither A nor B9. The term "precedent" in legal English refers to:A. A legal principle or rule established in a previous case that is binding in courtB. A document that outlines the facts of a caseC. A legal agreement between partiesD. A formal request for a court to review a case10. What does the term "actus reus" mean in criminal law?A. The guilty mindB. The wrongful actC. The criminal intentD. The legal defense二、填空题(每空1分,共10分)11. In legal English, "due process" refers to the fundamental legal rights that must be observed to ensure a fair trial.- The term "due process" is derived from the Latin phrase "due process of law."12. A "writ" is a formal written order issued by a court, typically directed to someone other than the parties in a case.- An example of a writ is a "writ of _habeas corpus_."13. The term "negligence" in tort law refers to the failure to exercise the degree of care that a reasonable person would exercise in the same situation to prevent harm to others.- In order to establish negligence, a plaintiff must prove the defendant's duty of care, breach of that duty, causation, and _damages_.14. "Probate" is the legal process by which a will is proved to be valid or invalid.- The court that oversees probate proceedings is known as the _probate court_.15. "Jurisdiction" refers to the authority of a court to hear and decide cases.- There are different types of jurisdiction, including_personal jurisdiction_, subject matter jurisdiction, and territorial jurisdiction.三、简答题(每题5分,共20分)16. Define "actus reus" and "mens rea" in the context of criminal law.17. Explain the concept of "joint and several liability" in tort law.18. What is the difference between "specific performance" and "damages" as remedies in contract law?19. Describe the process of "discovery" in civil litigation.四、案例分析题(每题15分,共30分)20. Case Study: A company has been accused of patent infringement. The company argues that they were not aware of the patent and therefore should not be held liable. Discuss the legal principles that may apply to this case and the possible outcomes.21. Case Study: A tenant has been evicted from their apartment without proper notice. The tenant claims that the eviction was unlawful. Analyze the relevant legal provisions and discuss the tenant's potential remedies.五、论述题(共20分)22. Discuss the role of language in legal interpretation and the challenges it presents. Provide examples to support your argument.参考答案:一、选择题1-5: D T A B B6-10: B C A B B二、填空题11. "due process of law"。

Scalar costa scheme for information embedding

Scalar costa scheme for information embedding

Scalar Costa Scheme for InformationEmbeddingJoachim J.Eggers,Robert B¨a uml,Roman Tzschoppe,Bernd GirodAbstract1Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security.Digital watermarking,which is an information hiding technique where the embedded information is robust against malicious or accidental at-tacks,might offer new possibilities to enforce the copyrights of multimedia data.In this article,the specific case of information embedding into independent identically distributed(IID)data and attacks by additive white Gaussian noise(AWGN)is considered.The original data is not available to the decoder.For Gaussian data,Costa pro-posed already in1983a scheme that theoretically achieves the capacity of this communication scenario.However, Costa’s scheme is not practical.Thus,several research groups have proposed suboptimal practical communication schemes based on Costa’s idea.The goal of this artical is to give a complete performance analysis of the scalar Costa scheme(SCS)which is a suboptimal technique using scalar embedding and reception rmation theoretic bounds and simulation results with state-of-the-art coding techniques are compared.Further,reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated.KeywordsInformation embedding,communication with side-information,blind digital watermarking,scalar Costa schemeI.I NTRODUCTIONESEARCH on information embedding has gained substantial attention during the last years.Thisis mainly due to the increased interest in digital watermarking technology which potentially can solve copyright infringements and data integrity disputes.Digital watermarking is considered as the im-perceptible,robust,secure communication of information by embedding it in and retrieving it from other digital data.The basic idea is that the embedded information–the watermark message–travels with the multimedia data wherever the watermarked data goes.Over the last years,many different watermarking schemes for a large variety of data types have been developed.Most of the work considers still image submitted to:IEEE Transactions on Signal Processing,Special Issue on:Signal Processing for Data Hiding in Digital Media &Secure Content Deliverydata,but watermarking of audio and video data is popular as well.Theoretical limits of digital watermark-ing have been investigated since about1999[1],[2],[3].In general,watermark embedding techniques and attacks against watermarks have to be designed specifically for certain host data types.A particularly interesting case is that of i dentically d dditive w aussian n=+Encoder DecoderFig.1.Blind watermark communication facing an AWGN attackWatermark communication as shown in Fig.1can be considered as communication with side-information at the encoder.This has beenfirst realized in1999by Chen and Wornell[7]and Cox,Miller and McK-ellips[8].Chen and Wornell introduced an important but almost forgotten paper by Costa into the wa-termarking community.Costa[9]showed theoretically that the channel capacity for the communication scenario depicted in Fig.1with an IID Gaussian host signal is(1) independent of.The suffix“ICS”stands for i osta satermark-to-n atio.The result(1)is surprising since it shows that the original data need not be considered as interference at the decoder although the decoder does not know.Costa presents a theoretic scheme which involves a random codebook which is(2)where and are realizations of two-dimensional independent random processes and with Gaussian p ensity fcalar C cheme(SCS).The accurate and complete performance analysis of SCS is the main topic of this paper.Before discussing SCS,we give a brief review of related research on the implementation of Costa’s scheme.Chen and Wornell developed in1998q ndex mistortion cdimensional embedding techniques where the dimensionality tends to infinity.This approach enables the analytical derivation of performance bounds.However,little is said about the performance of currently implementable schemes.Further,simulation results using state-of-the-art channel coding techniques are not provided.Chen and Wornell also discuss a simplification of DC-QIM where the indexed quantizers are derived via dithered prototype quantizes.This technique is investigated particularly for the case of uniform scalar prototype quantizers,which is denoted as d ompensated d odulaton(DC-DM).Chen and Wornell present a coarse performance analysis of DC-DM that is based on minimum-distance arguments and the variances of the watermark and the attack noise.However,the specific shape of the involved PDFs of the transmitted and received signals are not modelled accurately so that tight performance limits cannot be computed.Ramkumar and Akansu[12],[13],[14],[15],[16]propose a blind watermarking technique based on periodic embedding and reception functions for self-noise suppression(host signal interference reduc-tion).In particular low dimensional versions of this approach,e.g.,with scalar embedding and reception functions,are closely related to suboptimal implementations of Costa’s scheme.Ramkumar and Akansu consider during their analysis a proper modelling of the PDFs of the transmitted signals.However,their analysis of the receiver performance involves approximations that are only valid if adjacent codebook entries for identical messages are far from each other.This assumption is not valid for a large range of practically relevant s.Further,Ramkumar and Akansu present a capacity analysis based on an equivalent noise variance derived from the PDFs of the transmitted signal.This analysis is a good ap-proximation only for low s.For high s,evaluation of the presented capacity formula results in values above the Shannon limit.Nevertheless,it should be emphasized that certain versions of the technique proposed by Ramkumar and Akansu show good performance particularly for very low s. SCS outperforms their approach in the range of typical s only slightly[17].Chou et al.[18]exploit the duality of communication with side-information at the encoder to source coding with side-information at the decoder to derive a watermarking scheme based on trellis-coded quantization.This work can be considered as an extension of the research on practical implementations of Costa’s scheme in the direction of high dimensional embedding and reception rules.However,research in this direction is difficult and little progress has been made within the last years.Up to now,performance results that are better than the theoretical capacity limit of ST-SCS propose(see Sec.V)have not been test results by Chou et al.[19]show at least a slight improvement of turbo coded trellis-based constructions over simple SCS communication using coded modulation techniques.Note also thatSCS communication might still remain attractive due to its simplicity even if superior performance of high dimensional embedding techniques can be shown in future.Note also that principles of Costa’s work on communication with side information have recently gained some attention within multiuser communications[20],[21],[22].The goal of this paper is to summarize theoretical and experimental results on the performance of the practical SCS embedding and reception technique.An accurate performance analysis is based on properly derived PDFs of the transmitted and received data.Further,a comparison of the performance of state-of-the art coding techniques with theoretical performance limits is given.In Sec.II,SCS is derived formally and the encoding and decoding process is outlined.Theoretical performance limits of SCS are derived in Sec.III.Experimental results for SCS communication at high rates(low noise power)are given in Sec.IV.Sec.V discusses SCS communication at low rates,which is particularly important for robust digital watermarking.Sec.VI discusses the important extension of the AWGN attack to an attack with additional amplitude scaling.An efficient algorithm for the estimation of such amplitude scaling attacks is presented.Finally,the invertibility of SCS watermark embedding is investigated in Sec.VII,which is of interest if the distortion introduced by watermark embedding should be reduced or even removed by the legal user of a watermarked document.II.S CALAR C OSTA S CHEMEFor a practical implementation of Costa’s scheme,the usage of a suboptimal,structured codebook is proposed,while leaving the main concept of Costa’s scheme unchanged.Besides being practical,the developed scheme is independent from the data distribution.This property can be achieved for a properly chosen embedding key sequence[5],[6].When no key is used,a reasonably smooth PDF and must be assumed.To obtain a codebook with a simple structure,is chosen to be a product codebook of dithered uniform scalar quantizers,which is equivalent to an-dimensional cubic lattice[23].A.SCS EncoderFirst,the watermark message,where is a binary representation of,is encoded into a sequence of watermark letters of length.The elements belong to a-ary alphabet .-ary signaling denotes SCS watermarking with an alphabet of size. In many practical cases,binary SCS watermarking()will be used.Second,the-dimensional codebook of Costa’s scheme is structured as a product codebookof one-dimensional component codebooks,where all component codebooks are identical.For-ary signaling,the component codebook must be separated into distinct parts so that(4) The codebook is chosen to be equivalent to the representatives of a scalar uniform quantizer with step size,which is formally denoted as(6)so that each sub-codebook is equivalent to the representatives of a scalar uniform quantizer with step size .A simple and efficient encryption method for the SCS codebook is the derivation of a cryptographically secure pseudo-random sequence from the watermark key,with,and the modification of each component codebook so thatwhere denotes scalar uniform quantization with step size.Finally,the transmitted watermark sequence is given by(9) and the watermarked data is(10)A block diagram of the presented watermark embedding scheme is depicted in Fig.2.Fig.3shows an example input-output characteristic for.The embedding of can be expressed as subtractive dithered quantization,where is the dither sequence and is the step size of the uniform scalar quantizer.Note that the quantization error and thus also,is almost orthogonal to the quantizer input for an almost uniform original data PDF in the range of one quantization bin.For the given codebook encryption by a uniformly distributed key sequence,it can even be shown[24],[25] that and are statistically independent from,as it is in Costa’s ideal scheme.Further,the power of the quantization error is always E for the given distribution of the key sequence.SCS embedding depends on two parameters:the quantizer step size and the scale factor.For a given watermark power,these parameters are related byPSfrag replacementsIEEE TRANSACTIONS ON SIGNAL PROCESSING,VOL.XX,NO.Y,MONTH20028PSfragFig.3.Input-output characteristic for SCS embedding().In general,the decoding reliability can be improved by decoding an entire watermark letter sequence,where the known encoding of into can be exploited to estimate the most likely,or equivalently,toestimate the most likely watermark message.The simple codebook structure of SCS can be exploitedto efficiently estimate.First,data is extracted from the received data.This extraction processoperates sample-wise,where the extraction rule for the th element is(12)For binary SCS,,where should be close to zero if was transmitted,and close to for.Second,depending on the type of error correction encoding of,soft-input decoding algorithms,e.g.a Viterbi decoder for convolutional codes,can be used to decode from the most likely transmitted watermark message.C.Quantization Index Modulation and Dither ModulationQ ndex mither millustrations.SCS and DM are based on uniform scalar quantization with step size.It is assumed that the host data is almost uniformly distributed over the range of several quantizer bins.This assumption is reasonable in most watermarking applications,where the host-data power is much stronger than the watermark power ().Note that the introduced assumptions may no longer be valid in case of SCS embedding for strong attacks since might become quite large.For the following analysis it is not necessary to accurately model the PDF for all possible values of.It is sufficient to have an accurate model for in the range of several quantizer bins.Thus,for mathematical convenience,is considered periodic with period.With the introduced assumptions,the shape of one period of,denoted by, can be easily derived from the embedding rules for SCS and DM:DM:(13)SCS:(14)denotes the Dirac impulse and the rectangular signal is for andfor.The PDFs are almost identical to except for a shift by ,that is(17)where‘’denotes convolution.(17)is valid for.Since it is assumed thatis periodic with period,is also periodic with period.One such period ofPSfrag replacementsPSfragto the encoder and decoder.(18)shows that the capacity of communication with side information at the encoder is given by the difference of information that the codebook gives about the received data and about the side information.In general,maximization over all possible codebooks and over all corresponding embedding functions is required.Here,the capacity of the suboptimum schemes DM and SCS is considered.SCS is constrained to a codebook based on scalar quantizers,which are parameterized by and as shown in(5).and are related forfixed embedding distortion by(11).Thus,there is only one free codebook parameter forfixed embedding distortion so that the capacity of SCS is given by(19)DM is a special case of SCS with so that the capacity of DM is directly given by(20)The watermark message is encoded such that for each data element an alphabetof watermark letters is used,where each letter is equiprobable.Then the mutual information is given by[30](22) This leads with(11)topread-sPSfragocument-to-w atio.This shows that blind watermark reception suffers sig-nificantly from original signal interference.The depicted capacity of blind SS watermarking is for .For weak to moderately strong attacks(i.e.,s greater than about)SCS watermarking outperforms SS watermarking by far due to the data independent nature of SCS water-marking.However,Fig.8also reveals that for very strong attacks(),blind SS is more appropriate than SCS watermarking since here the attack distortion dominates possible interference from the original signal.Note that ICS outperforms blind SS watermarking for all s.Fig.8shows also that the binary SCS capacity is limited for high s due to the binary alphabetof watermark letters.Increasing the size of the signaling alphabet enables higher capacities for high s as shown in Fig.9.It can be observed that for very large signaling alphabets,the capacityPSfragPSfragodulation withc odes(CC-TCM)as proposed by Ungerboeck[35].-ary signaling is used in combina-tion with a new t oded m erial cPSfragA.Repetition Coding and Spread TransformThe simplest approach for the redundant embedding of the information bits into the original data is the repeated embedding of each bit.An alternative approach for redundant embedding of the information bits into the original data is the spread-transform(ST)technique as proposed in[7].We found that repetition coding with SCS performs worse than ST with SCS(ST-SCS)which is not obvious at thefirst glance.Here,we illustrate the reason for this result.Let denote the repetition factor for SCS with repetition coding,e.g.,one information bit is embedded into consecutive data elements.However,instead of deciding for each extracted value what trans-mitted watermark letter is most likely,the decoder can directly estimate the most likely transmitted watermark information bit from consecutive extracted values[4],[5].Spread transform watermarking has been proposed by Chen and Wornell[7].A detailed description of this technique can be found in[7],[4],[5].Here,we focus on the general principle.In ST watermarking, the watermark is not directly embedded into the original signal,but into the projection of onto a random sequence.Note that the term“transform”,as introduced by Chen and Wornell,is somewhat misleading since ST watermarking is mainly a pseudo-random selection of a signal component to be watermarked.All signal components orthogonal to the spreading vector remain unmodified.Let denote the spreading factor,meaning the number of consecutive original data elements belonging to one element.For watermark detection,the received data is projected onto,too.The basic idea behind ST water-marking is that any component of the channel noise that is orthogonal to the spreading vector does not impair watermark detection.Thus,an attacker,not knowing the exact spreading direction,has to introduce much larger distortions to impair a ST watermark as strong as a watermark embedded directly into.For an AWGN attack,the effective after ST with spreading factor is given by(25)Thus,doubling the spreading length gives an additional power advantage of3for the watermark in the ST domain.However,note that repetition coding and ST with and,respectively,achieve more robustness against attack noise at the cost of a reduced watermark rate.For a fair comparison of SCS with repetition coding and ST-SCS the watermark rate of both schemes should be equal,i.e.the repetition factor and the spreading factor should be equal().The s for SCS with repetition coding and ST-SCS after an AWGN attack have been measured fordifferent s.Fig.11shows simulation results for and.It has been observedthat ST-SCS yields significantly lower s than SCS with repetition coding at the same watermarkingrate.The predicted gain of3for the same decoding reliability by doubling can be observed.However,the gain for SCS with repetition coding is less than3when.The observedeffect can be explained by examining the specific structure of the codebook in SCS.PSfragdoes not affect the decision whether the transmitted bit was0or1.Further,each circle is surroundedonly by two crosses.Thus,the probability that AWGN pushes watermarked data into the area where adecoding error occurs is lower for ST-SCS than for SCS with repetition coding.15105−5−10Sfrag−15−15−10−5051015B.Capacity of ST-Watermarking and Optimal Spreading FactorST-SCS watermarking should be considered a different suboptimal approach to implement a transmis-sion scheme with side information at the encoder.Thus,the achievable rate of ST-SCS might be larger than that of SCS.Note that ST-SCS can never perform worse than SCS since SCS is a special case of ST-SCS with.The optimum choice of the spreading factor for attacks of differing noise powers is investigated.Let denote the capacity of a specific watermarking scheme combined with a spread transform with spreading factor for an AWGN attack with given.is the capacity of the respective scheme without ST.The performance of ST watermarking can be computed from that of the respective scheme without ST byurbo-cPSfragPSfragAttack−30−20−10010203010.80.60.40.2−30−20−10010203010.80.60.40.2PSfragsignal power.An exact characterization of is not necessary for our purpose.A sufficiently accurate model is given by(30)where is an appropriate constant with.The model parameters and are directly related to the unknown parameters and.determines the distance between two local maxima,anddetermines their absolute position.The exact relationship is given by(31)Fig.18depicts an example for the given model.The local maxima of the conditional PDFswith a relative distance of are clearly visible.PSfragAll spectra can be combined in an elegant way due to the systematically different phase at and.The spectra are multiplied by(33)Thus,for the model given in(30),has only one peak,which is located exactly at the frequency .Further,is superior to a multiplication by. In the latter case,the spectrum would have another peak at which increases the required sampling interval for the numerical computation of the conditional PDFs.The exact PDFs of the received signal do notfit exactly to the model given in(30).Further,in practice, the PDFs and can be only estimated from the pilot samples.This estimation is obtained from histograms with bins that cover the total range of all received samples.Based on these histograms,is computed at discrete frequencies via a length-DFT. Here,a single peak in the spectrum cannot be exptected due to estimation errors and the inaccuracy of the model(30).Nevertheless,for sufficiently large,a dominating peak should occur at. Details of the outlined implementation are described in[5],[37].B.Estimation performance for differentThe outlined algorithm for the estimation of and is dependent on the following set of param-eters::length of pilot sequence:number of histogram bins used for the pilot sample value:number of histogram bins used for the key value:DFT lengthThe estimation accuracy also depends on the,and on the.In this paper,the estimation performance for different pilot length is discussed for.This range for covers the most interesting range of attack strengths for that SCS watermarking might be useful.The has beenfixed to and the remaining parameters are, ,and.Experimental results that support this choice of parameters are given in [5].The influence of the number of received pilot elements is studied experimentally.For simplicity, and no offset has been considered so that the estimator should ideallyfind and .For the evaluation of the estimation performance,three differentfigures of merit have been used:relative error of(34)relative error of(35)Erelative increase of bit-error probabilityIEEE TRANSACTIONS ON SIGNAL PROCESSING,VOL.XX,NO.Y ,MONTH 200230PSfrag replacementsPSfrag replacements[](b)(d)Fig.19.Estimation performance for different pilot lengths (,,).For ,this effect occurs for .For ,a minimum of about -5is required.Fig.19.(b)depicts which follows in general the behavior of .The resulting relative increase of the uncoded error rateis shown with linear and logarithmic axes in Fig.19.(c)and Fig.19.(d),respectively.increases monotonically with decreasing pilot length .Further,it can beobserved again that for some low the estimation algorithm starts to fail completely.Nevertheless,it is quite promising that even for ,is lower than 2%for all.C.Estimation Based on SS Pilot SequencesSo far,an estimation of the SCS receiver parameter based on a known SCS watermark has been proposed.However,it is also possible to estimate the scale factor ,and thus ,with help of an additive spread-spectrum (SS)pilot watermark.Here,we present an analysis of the estimation accuracy,as defined in Sec.VI-B,when using SS pilot watermarks and compare the result with those for SCS pilot watermarks.We consider again the attack channel defined in (27).However,now,we assume that is a pseudo-noise sequence of length with zero mean ()and power,respectively.is known to the watermark receiver so that can be estimated from based on the correlation between and,that isEE E(40)(42)Var E EVarEE E VarSfragand.The effect of possible remaining bit errors after error correction decoding,and thus imperfect knowledge of,is not investigated.However,it is obvious that for low bit-error rates the influence of the incorrect inverse mapping applied to those samples with incorrectly received dither samples on the overall quality improvement by inverse SCS is negligible.A.Inverse SCS in the Noiseless CaseIn the noiseless case,the watermark decoder receives the signal.In this case,the deterministic embedding procedure can be inverted perfectly.With from(12)the host signal can be reconstructed with the next valid SCS codebook entry(46)bydeviation from the next valid SCS codebook entry is given by(48)For AWGN attacks,the most likely corresponding quantized original signal sample is.Thus,the MMSE estimate isEE(49)where is no longer considered within the minimization,and has to be chosen such that the MSE E is minimized.Straightforward analysis shows that has to be computed byE(50)Thus,to solve the estimation problem,the conditional PDF must be known.It is assumed that is independent from,which is approximately valid for AWGN attacks and an almostflat PDF in the range of one quantization interval,e.g.,fine quantization,so that .Thus,the random variable with support in is introduced and the PDFis considered in the following.First,Bayes’rule is applied which yieldsSfragstoring the data.This quantization can be approximated by low-power noise.In such a scenario,the in-verse scaling derived for the noiseless case might be not appropriate,but the MMSE estimation removes a good deal of the distortion introduced by the SCS watermark,as demonstrated in Fig.22.VIII.C ONCLUSIONS AND O UTLOOKInformation embedding into IID original data and an attack by AWGN has been investigated.The decoder has no access to the original data.This scenario can be considered communication with side-information at the encoder for that a theoretical communication scheme has been derived by Costa in 1983.In this paper,a suboptimal practical version of Costa’s scheme has been studied.The new scheme is named“scalar Costa scheme”(SCS)due to the involved scalar quantization during encoding and de-coding.A performance comparison of different blind watermarking schemes shows that SCS outperforms the related DM techniques for low s and performs significantly better than state-of-the-art blind SS watermarking for the relevant range of s.The latter result is mainly due to the independence of SCS from the characteristics of the original signal.SCS combined with coded modulation achieves a rate of1bit/element at,which is within1.6of the SCS capacity.For, SCS communication with rate1/3turbo coding achieves.For lower s,SCS should be combined with the spread-transform(ST)technique so that SCS operates effectively at a. Two further topics that are relevant for the usage of SCS in practical information hiding systems are investigated.These are the robustness to amplitude scaling on the watermark channel and the removal of watermark embedding distortion by authorized parties.Robustness against amplitude scaling can be achieved via robust estimation of the proper SCS quantizer step size at the receiver as described in Sec.VI. In Sec.VII,it is shown that the reduction of watermark embedding distortion is possible for low attack noise.The performance gap between SCS and ICS has to be bridged by constructing more complicated code-books and by extending the embedding and detection rule to non-scalar operations.Research in this direction has been started,e.g.,by Chou et al.[18].However,SCS might still remain an attractive technique for many information embedding applications due to its simple structure and host signal inde-pendent design.A CKNOWLEDGMENTSThe authors would like to thank Jonathan Su for the contributions to this work during his stay at the University of Erlangen-Nuremberg.Further,we would like to thank Ton Kalker for fruitfull discussionsconcerning the SCS step size estimation which helped to improve the explanation of our alorithm signifi-cantly.R EFERENCES[1] B.Chen and G.W.Wornell,“Provably robust digital watermarking,”in Proceedings of SPIE:Multimedia Systems andApplications II(part of Photonics East’99),Boston,MA,USA,September1999,vol.3845,pp.43–54.[2]P.Moulin and J.A.O’Sullivan,“Information-theoretic analysis of information hiding,”IEEE Transaction on InformationTheory,January2001.[3]J.K.Su and B.Girod,“Power-spectrum condition for energy-efficient watermarking,”in Proceedings of the IEEE Intl.Conference on Image Processing1999(ICIP’99),Kobe,Japan,October1999.[4]J.J.Eggers,J.K.Su,and B.Girod,“Performance of a practical blind watermarking scheme,”in Proc.of SPIE Vol.4314:Security and Watermarking of Multimedia Contents III,San Jose,Ca,USA,January2001.[5]Joachim J.Eggers,Information Embedding and Digital Watermarking as Communication with Side Information,Ph.D.thesis,Lehrstuhl f¨u r Nachrichtentechnik I,Universit¨a t Erlangen-N¨u rnberg,Erlangen,Germany,November2001.[6]J.Eggers and B.Girod,Informed Watermarking,Kluwer Academic Publishers,Boston,Dordrecht,London,2002.[7] B.Chen and G.W.Wornell,“Achievable performance of digital watermarking systems,”in Proceedings of the IEEE Intl.Conference on Multimedia Computing and Systems(ICMCS’99),Florence,Italy,June1999,vol.1,pp.13–18.[8]I.J.Cox,ler,and A.L.McKellips,“Watermarking as communications with side information,”Proceedings ofthe IEEE,Special Issue on Identification and Protection of Multimedia Information,vol.87,no.7,pp.1127–1141,July 1999.[9]M.H.M.Costa,“Writing on dirty paper,”IEEE Transactions on Information Theory,vol.29,no.3,pp.439–441,May1983.[10] B.Chen and G.W.Wornell,“Digital watermarking and information embedding using dither modulation,”in Proc.ofIEEE Workshop on Multimedia Signal Processing(MMSP-98),Redondo Beach,CA,USA,Dec.1998,pp.273–278. [11] B.Chen and G.Wornell,“Preprocessed and postprocessed quantization index modulation methods for digital watermark-ing,”in Proc.of SPIE Vol.3971:Security and Watermarking of Multimedia Contents II,San Jose,Ca,USA,January2000, pp.48–59.[12]M.Ramkumar and A.N.Akansu,“Self-noise suppression schemes in blind image steganography,”in Proceedings ofSPIE:Multimedia Systems and Applications II(part of Photonics East’99),Boston,MA,USA,September1999,vol.3845,pp.55–65.[13]M.Ramkumar,Data Hiding in Multimedia:Theory and Applications,Ph.D.thesis,Dep.of Electrical and ComputerEngineering,New Jersey Institute of Technology,Kearny,NJ,USA,November1999.[14]M.Ramkumar and A.N.Akansu,“FFT based signaling for multimedia steganography,”in Proceedings of the IEEE Intl.Conference on Speech and Signal Processing2000(ICASSP2000),Istanbul,Turkey,June2000.[15]M.Ramkumar and A.N.Akansu,“Floating signal constellations for multimedia steganography,”in Proceedings of theIEEE International Conference on Communications,ICC2000,New Orleans,LA,USA,June2000,vol.1,pp.249–253.[16]L.Gang,A.N.Akansu,and M.Ramkumar,“Periodic signaling scheme in oblivious data hiding,”in Proceedings of34thAsilomar Conf.on Signals,Systems,and Computers,Asilomar,CA,USA,October2000.。

《专利法》 第 76条 英文

《专利法》 第 76条 英文

《专利法》第 76条英文Article 76 of the Patent Law of the People's Republic of China states the provisions regarding the scope of protection conferred by a patent. This article plays a crucial role in determining the rights and limitations of patent holders. In this article, we will explore the key points of Article 76 and its implications for patent protection in China.Article 76 establishes that the scope of protection granted by a patent is determined by the claims. The claims define the technical features of the invention for which protection is sought. It is essential for the claims to be clear, concise, and supported by the description and drawings in the patent application.The claims serve as a boundary for patent protection, defining the extent to which others are prohibited from making, using, selling, or importing the patented invention without the patent holder's permission. Any act that falls within the scope of the claims constitutes an infringement of the patent rights.It is important to note that the scope of protection should be interpreted based on the claims' literal meaning and the corresponding description and drawings. The claims should not be interpreted too narrowly or too broadly. The principle of purposive construction is applied to determine the scope of protection, ensuring that the claims are interpreted in a way that aligns with the technical contribution of the invention.Furthermore, Article 76 emphasizes that the protection conferred by a patent shall not extend to subject matters that are not disclosed in the description and claims. This means that the patent holder cannot assert rights over undisclosed aspects of the invention. The disclosure requirement ensures that the public is provided with sufficient information about the invention in exchange for the exclusive rights granted to the patent holder.In addition to the literal meaning of the claims, equivalents are also considered within the scope of protection. Article 76 states that an infringement may still occur even if a product or process does not completely fall within the literal scope of the claims, aslong as it performs substantially the same function, achieves substantially the same result, and is based on substantially the same principle as the patented invention.The doctrine of equivalents allows patent holders to prevent others from making minor modifications to the patented invention to avoid infringement. It ensures that the patent holder's rights are not easily circumvented by slight variations in the infringing product or process.However, it is important to strike a balance between the rights of the patent holder and the interests of the public. Article 76 also provides limitations to the scope of protection to prevent patent holders from obtaining excessive rights. These limitations include the experimental use exemption, the exhaustion of rights principle, and the Bolar exemption for pharmaceutical research.In conclusion, Article 76 of the Patent Law of the People's Republic of China defines the scope of protection conferred by a patent. It establishes that the claims are the key determinant of the scope of protection, and they should be interpreted based on their literal meaning, the corresponding description, and drawings. The doctrine of equivalents allows patent holders to prevent others from making minor modifications to the patented invention. However, limitations are also in place to strike a balance between patent rights and the public interest. Understanding the provisions of Article 76 is essential for both patent holders and those seeking to avoid infringement.。

2024年教师资格(初级中学)-英语知识与教学能力(高中)考试历年真题摘选附带答案

2024年教师资格(初级中学)-英语知识与教学能力(高中)考试历年真题摘选附带答案

2024年教师资格(初级中学)-英语知识与教学能力(高中)考试历年真题摘选附带答案第1卷一.全考点押密题库(共100题)1.(单项选择题)(每题2.00 分)His___________in alcohol mined his whole life.A. indulgenceB. habitC. engagementD. addiction2.(单项选择题)(每题 2.00 分)Mr. Woods, I am here just in case anything out of the ordinary__________.A. happensB. happenC. would happenD. will happen3.(单项选择题)(每题 2.00 分) Which of the following activities is the most suitable for group work?______.A. guessing gameB. story tellingC. information-gapD. drama performance4.(单项选择题)(每题 2.00 分) Which of the following activities can be used to get the main idea of a passage?A. Reading the passage in detail.B. Reading to sequence the events.C. Reading to fill in the charts.D. Reading the first and last sentences of the passage and the paragraphs.5.(单项选择题)(每题 2.00 分) To our surprise, the stranger______to be an old friend of my mother’s.A. turned outB. turned upC. set outD. setup6.(单项选择题)(每题 2.00 分) new buildings will be built in my hometown.A. A great deals ofB. A lots ofC. A plenty ofD. A great number of7.(单项选择题)(每题 2.00 分) 请阅读Passage2,完成下列小题.Passage 2We had been wanting to expand our children‘s horizons by taking them to a place that was unlike anything wed been exposed to during our travels in Europe and the United States. In thinking about what was possible from Geneva,where we are based, we decided on a trip to Istanbul a two-hour plane ride from Zurich.We envisioned the trip as a prelude to more exotic ones, perhaps to New Delhi or Bangkok later this year, but thought our 11- and 13-year-old needed a first step away from manicured boulevards and pristine monuments.What we didn’t foresee was the reaction of friends, who warned that we were putting our children “in danger",referring vaguely, and most incorrectly, to disease, terrorism or just the unknown. To help us get acquainted with the peculiarities of Istanbul and to give our children a chance to choose what they were particularly interested in seeing, we bought anexcellent guidebook and read it thoroughly before leaving. Friendly warnings didn’t change our planning:although we might have more prudently checked with the U.S. Department’s list of troublespots. We didn’t see a lot of children among the foreign visitors during our six-day stay in Istanbul, but we found the tourist areas quite safe, veryinteresting and varied enough even to suit our son, whose oft-repeated request is that we not see “every single” church and museum in a given city.Vaccinations werent needed for the city, but we were concerned about adapting to the water for a short stay. So we used bottled water for drinking and brushing our teeth, a precaution that may seem excessive, but we all stayed healthy.Taking the advice of a friend, we booked a hotel a 20-minute walk from most of Istanbul’s major tourist sites. This not only got us some morning exercise, strolling over the Karakoy Bridge, but took us past a colorful assortment of fishermen, vendors and shoe shiners. From a teenager and preteens view. Istanbul street life is fascinating since almost everything can be bought outdoors. They were at a good age to spend time wandering the labyrinth of the Spice Bazaar, where shops display mounds of pungent herbs in sacks. Doing this with younger children would be harder simply because the streets are so packed with people; it would be easy to get lost.For →our two←, whose buying experience consisted of department stores and shopping mall boutiques, it was amazing to discover that you could bargain over price and perhaps end up with two of something for the price of one. They also learned to figure out the relative value of the Turkish lira, not a small matter with its many zeros.Being exposed to Islam was an important part of our trip. Visiting the mosques, especially the enormous Blue Mosque, was our first glimpse into how this major religion is practiced. Our children’s curiosity already had been piqued by the five daily calls to prayer over loudspeakers in every comer of the city, and the scarves covering the heads of many women. Navigating meals can be troublesome with children, but a kebab, bought on the street or in restaurants, was unfailingly popular. Since we had decided this trip was not for gourmets, kebabs spared us th e agony of trying to find a restaurant each day that would suit the adults’ desire to try something new amid children’s insistence that the food be served immediately. Gradually, we branched out to try some other Turkish specialties. Although our son had studied Islam briefly, it is impossible to be prepared for every awkward question that might come up, such as during our visits to the Topkapi Sarayi, the Ottoman Sultans9 palace, no guides were available so it was do-it-yourself, using our guidebook, which cheated us of a lot of interesting history and anecdotes that a professional guide could provide. Next time, we resolved to make such arrangements in advance.On this trip, we wandered through the magnificent complex, with its imperial treasures, its courtyards and its harem. The last required a bit of explanation that we would have happily left to a learned third party.Whom does“our two”in PARAGRAPH 5 refer to? ______ .A. the coupleB. the kidsC. the gourmetsD. local-style markets8.(单项选择题)(每题 2.00 分) Which of the following statements is NOT a way of presenting new vocabulary?____.A. definingB. using real objectsC. writing a passage by using new wordsD. giving explanations9.(单项选择题)(每题 2.00 分) Exceptional children are different in some significant ways from others of the same age, for the same age, for these children to develop to their full adult potential; their education must be adapted to those differences.Although we focus on the needs of exceptional children, we find ourselves describing their environment as well. While the leading actor on the stage captures our attention, we are aware of the importance of the supporting players and the scenery of the play itself. Both the family and the society in which exceptional children live are often the key to their growth and development. And it is in the public schools that we find the full expression of society5s understanding the knowledge, hopes, and fears that are passed on to the next generation.Education in any society is a mirror of that society. In that mirror we can see the strengths, the weaknesses, the hopes, the prejudices, and the central values of the culture itself. The great interest in exceptional children shown in public education over the past three decades indicates the strong feeling in our society that all citizens, whatever their special conditions, deserve the opportunity to fully develop their capabilities.“All men are created equal.” We’ve heard it many times, but it still has important meaning for education in a democratic society. Although the phrase was used by this countrys founders to denote equality before the law, it has also been interpreted to mean equality of opportunity. That concept implies educational opportunity for all children—the right of each child to receive help in learning to the limits of his or her capacity, whether that capacity be small or great. Recent court decisions have confirmed the right of all children—disabled or not —to an appropriate education, and have ordered that public schools take the necessary steps to provide that education. In response, schools are modifying their programs, adapting instruction to children who are exceptional to those who cannot profit substantially from regular programs.From its passage we learn that the educational concern for exceptional children______.A. is now enjoying legal supportB. disagrees with the tradition of the countryC. was clearly stated by the country’s foundersD. will exert great influence over court decisions10.(单项选择题)(每题 2.00 分)What stage can the following grammar activity be used at?The teacher asked students to arrange the words of sentences into different columns marked subject, predicate, object, object complement, adverbial and so on.A. Presentation.B. Practice.C. Production.D. Preparation.11.(单项选择题)(每题 2.00 分)According to Britain linguist F. Palmer, there are no real synonyms. Though"cast" and"throw" are considered synonyms, they are different in__________.A. styleB. collocationC. emotive meaningD. regions where they are used12.(单项选择题)(每题 2.00 分)What advantage do the new generation Latino writers have over LatinAmericanwriters according to the passage?A. The former are able to write in two different languages.B. The former can translate their works into different languages.C. The former are able to express ideas from a bi-cultural perspective.D. The former can travel freely across the border between two countries.13.(单项选择题)(每题 2.00 分) It is not so much the language______the cultural background that makes the book difficult to understanD.A. asB. butC. likeD. nor14.(单项选择题)(每题 2.00 分)Which inference in the brackets of the following sentences is apresupposition?A. Ede caught a trout. (Edecaught a fish.)B. Don' t sit on Carol' s bed. (Carol has a bed.)C. This blimp is over the house. (The house is under the blimp.)D. Coffee would keep me awake all night. (I don' t want coffee.)15.(单项选择题)(每题 2.00 分) There are many different ways of presenting grammar in the classroom. Among them, three are most frequently used and discusseD. Which one does not belong to them?______.A. deductive methodB. inductive methodC. guided discovery methodD. productive method16.(单项选择题)(每题 2.00 分) When a teacher teaches young learners English pronunciation, he should______.A. listen as much as possibleB. input regardless of students5 abilityC. tolerate small errors in continuous speechD. read more English materials17.(单项选择题)(每题 2.00 分) Which of the following activities is the best for training detailed reading?A. drawing a diagram to show the text structureB. giving the text an appropriate titleC. transforming information from the text to a diagramD. finding out all the unfamiliar words18.(单项选择题)(每题 2.00 分) Which of the following teacher‘s instruction could serve the purpose of eliciting ideas?A. Shall we move on?B. Read after me, everyoneC. What can you see in this picture?D. What does the world "quickly" mean?19.(单项选择题)(每题 2.00 分)Which of the following is suggested in the last paragraph?A. The quality of writing is of primary importance.B. Common humanity is central to news reporting.C. Moral awareness matters in editing a newspaper.D. Journalists need stricter industrial regulations.20.(单项选择题)(每题 2.00 分)What is the best title for this passage?A. Creativity. and InsightsB. Insights and Problem SolvingC. Where Do Insight Moments Come?D. Where Do Creativity Moments Come?21.(单项选择题)(每题 2.00 分) —Where did you find the wallet?—It was at the stadium______I played football.A. thatB. whereC. whichD. there22.(单项选择题)(每题 2.00 分) Water problems in the future will become more intense and more complex. Our increasing population will tremendously increase urban wastes, primarily sewage. On the other hand, increasing demands for water will decrease substantially the amount of water available for diluting wastes. Rapidly expanding industries which involve more and more complex chemical processes will produce large volumes of liquid wastes, and many of these will contain chemicals which are poisonous. To feed our rapidly expanding population, agriculture will have to be intensifieD. This will involve even increasing quantities of agriculture chemicals. From this, it is apparent that drastic steps must be taken immediately to develop corrective measures for the pollution problem.There are two ways by which this pollution problem can be lesseneD. The first relates to the treatment of wastes to decrease their pollution hazarD. This involves the processing of solid wastes prior to disposal and the treatment of liquid wastes, or effluents, to permit the reuse of the water or best reduce pollution upon final disposal.A second approach is to develop an economic use for all or a part of the wastes. Farm manure is spread in fields as a nutrient or organic supplement. Effluents from sewage disposal plants are used in some areas both for irrigation and for the nutrients containeD. Effluents from other processing plants may also be used as a supplemental source of water. Many industries,such as meat and poultry processing plants, are currently converting former waste production into marketable byproducts. Other industries have potential economic uses for their waste products.The phrase “prior to”(ParA. 2) probably means______.A. afterB. duringC. beforeD. beyond23.(单项选择题)(每题 2.00 分) 请阅读passage2,完成下列小题。

2025年全国大学英语CET四级考试试卷及答案指导

2025年全国大学英语CET四级考试试卷及答案指导

2025年全国大学英语CET四级考试模拟试卷及答案指导一、写作(15分)WritingTask: For this part, you are allowed 30 minutes to write a short essay on the topic “The Importance of Reading in Life.” You should write at least 120 words but no more than 180 words. You should base your essay on the outline given below:1.Introduce the significance of reading in daily life.2.Discuss the benefits of reading, such as expanding vocabulary, improving writing skills, and enhancing knowledge.3.Conclude by expressing your personal views on the importance of reading.Example:Reading: The Key to a Wealthy MindIn today’s fast-paced world, reading has become an essential part of daily life. It is not merely a hobby but a crucial tool for personal and professional growth.Firstly, reading greatly expands one’s vocabulary. By encountering new words and phrases in various contexts, individuals can enrich their languageskills and express themselves more effectively. Moreover, reading improves writing skills by providing examples of good sentence structure and persuasive arguments.Secondly, reading broadens one’s knowledge. Whether it’s through novels, non-fiction books, or articles, reading exposes us to different cultures, ideas, and perspectives. This not only fosters critical thinking but also helps us understand the world around us better.In conclusion, reading is an invaluable activity that enriches our minds and enhances our lives. It is through reading that we can continue to grow, learn, and adapt to the ever-changing world. As such, I firmly believe that reading should be a lifelong pursuit.Analysis:This example essay effectively addresses the topic by following the given outline. The introduction clearly states the significance of reading in daily life. The body paragraphs then discuss the benefits of reading, with the first paragraph focusing on vocabulary expansion and the second on knowledge enhancement. The conclusion summarizes the essay’s main points and reinforces the importance of reading.The essay demonstrates a good command of language, with a variety of sentence structures and appropriate vocabulary usage. It also maintains a coherent flow of ideas, making it easy for the reader to follow the aut hor’s argument.二、听力理解-短篇新闻(选择题,共7分)第一题Passage OneNews Item 1:A new study reveals that the number of people working from home has doubled in the past year due to the COVID-19 pandemic. Many companies have embraced remote work as a way to reduce costs and improve employee satisfaction. However, experts warn that this trend may lead to increased mental health issues among workers. The study suggests that employers should provide support systems to help employees manage the challenges of working from home.Questions:1、What is the main topic of the news item?A) The benefits of working from home.B) The challenges of working from home.C) The increase in remote work during the pandemic.D) The impact of remote work on mental health.2、Why have many companies embraced remote work?A) To reduce costs.B) To improve employee satisfaction.C) Both A and B.D) To address the COVID-19 pandemic.3、What is the concern expressed by experts regarding the trend of workingfrom home?A) It may lead to a decrease in employee satisfaction.B) It may increase mental health issues among workers.C) It may cause a decline in productivity.D) It may lead to more workplace accidents.Answers:1、C2、C3、B第二题News Item 1:A new study has shown that consuming green tea may help reduce the risk of developing Parkinson’s disease. Researchers at the University of California, Los Angeles, found that compounds in green tea called polyphenols can protect brain cells from the damage caused by toxins. The study followed over 1,000 individuals over a period of 10 years. Those who consumed green tea regularly were 50% less likely to develop Parkinson’s disease than those who did not.Questions:1、What is the main finding of the study conducted at the University of California, Los Angeles?A) Green tea can completely cure Parkinson’s disease.B) Regular consumption of green tea may reduce the risk of developingParkinson’s disease.C) Only those who drink green tea are at risk of develop ing Parkinson’s disease.D) Polyphenols in green tea are harmful to brain cells.2、How long did the study follow the participants?A) 5 yearsB) 7 yearsC) 10 yearsD) 12 years3、According to the study, what percentage reduction in the risk of developing P arkinson’s disease was observed in regular green tea consumers compared to non-consumers?A) 20%B) 30%C) 40%D) 50%Answers:1、B) Regular consumption of green tea may reduce the risk of developing Parkinson’s disease.2、C) 10 years3、D) 50%三、听力理解-长对话(选择题,共8分)第一题听力原文:A. Man: Hey, are you ready for the CET-4 exam?B. Woman: Yeah, I’ve been studying really hard for the past few months.I think I’m ready.A. Man: That’s good to hear. Do you have any tips for the listening section?B. Woman: Well, I would say practice is key. Listen to English news, watch English movies, and try to understand the conversations.A. Man: And what about the reading section?B. Woman: I would focus on reading a variety of materials like newspapers, magazines, and online article s. It’s important to get used to different styles of writing.A. Man: I see. And what about the writing section?B. Woman: For the writing section, I would recommend practicing writing essays on different topics. It’s also important to check your grammar and punctuation.A. Man: That makes sense. I’m going to do the same thing. Good luck!B. Woman: Thanks, and good luck to you too!选择题:1、What are the speakers mainly discussing?A. Preparation for the CET-4 examB. Different sections of the CET-4 examC. Tips for improving English listening skillsD. The importance of practice for the CET-4 exam2、What does the woman say about the listening section?A. She suggests focusing on reading materials.B. She thinks it’s important to practice listening to English news.C. She recommends studying grammar for the listening section.D. She suggests practicing writing essays for the listening section.3、What does the woman say about the reading section?A. She believes it’s important to study grammar for the reading section.B. She thinks it’s important to practice listening to English news.C. She recommends focusing on a variety of reading materials.D. She suggests practicing writing essays for the reading section.4、What does the woman suggest for the writing section?A. She recommends studying grammar for the writing section.B. She thinks it’s important to practice listening to English news.C. She suggests focusing on a variety of reading materials.D. She recommends practicing writing essays on different topics.答案:1、A2、B3、C4、D第二题Listen to the following conversation and answer the questions.W: Hi, John. How was your weekend?M: Oh, it was great. I decided to take a trip to the countryside. I went to visit an old friend who lives there.W: That sounds nice. Did you do anything specific?M: Yes, we went for a hike in the mountains. It was beautiful. We also stopped by a small village for lunch.W: Did you try any local dishes?M: Absolutely. We had this delicious chicken dish with potatoes and vegetables. It was so flavorful.W: That sounds amazing. How long did you stay?M: We spent the whole day there. We didn’t leave until evening. It was a perfect getaway.W: I wish I could go somewhere like that. What did you do when you got back?M: I just relaxed and took a nice, long shower. I was exhausted from all the walking.W: Sounds like a good way to unwind. Do you think you’ll go back anytime soon?M: I think so. My friend and I are planning another trip next month.1.What did the man do over the weekend?A) He stayed home.B) He visited a friend in the countryside.C) He went to the beach.D) He had a staycation.2.Why did the man go to the countryside?A) To see a family member.B) To attend a conference.C) To go hiking.D) To visit a museum.3.What did the man and his friend do while in the countryside?A) They watched a movie.B) They went shopping.C) They went for a hike.D) They had a picnic.4.What did the man say about the local food?A) It was too spicy.B) It was not as good as he expected.C) It was delicious and flavorful.D) It was too expensive.Answers:1.B) He visited a friend in the countryside.2.C) They went for a hike.3.C) They went for a hike.4.C) It was delicious and flavorful.四、听力理解-听力篇章(选择题,共20分)第一题听力篇章Passage OneQuestions 1 to 5 are based on the following passage.American football, originally a college game, was introduced into the United States by Walter Camp, who is called the “Father of American Football.” Camp was a coach at Yale University, and he is known as the man who invented the system of numbering the players on the field. The game was originally played by using a soccer ball. Camp suggested that a ball resembling a prolate spheroid (椭球体) be used. This ball is rounder than a soccer ball and is used in American football today.The rules of the game were also established by Camp. He divided the field into two sections, with the goal line in the center. The game was played with a single ball, and each team tried to carry the ball across the opponent’s goal line. The first team to do so would win the game. Camp also introduced the concept of tackling, which is the act of tackling an opponent to the ground. This is still a fundamental part of the game today.Over the years, American football has become a professional sport, with teams competing in the National Football League (NFL). The NFL is the most popular professional football league in the United States. The game is also played in high schools and colleges across the country.1、What is Walter Camp known for in American football?A)、Being the founder of the NFL.B)、Inventing the system of numbering players on the field.C)、Introducing the game to the United States.D)、Establishing the rules of the game.2、What did Camp suggest as a replacement for the soccer ball in the early days of American football?A)、A ball with a square shape.B)、A ball resembling a prolate spheroid.C)、A ball with a flat surface.D)、A ball with a hole in the center.3、According to the passage, what is the main objective of each team in an American football game?A)、To score points by carrying the ball across the opponent’s goal line.B)、To tackle the opponent’s players to the ground.C)、To win the game by scoring the most points.D)、To pass the ball to the opponent’s team.第二题PassageIn recent years, the concept of “slow living” has gained significant attention around the world. This movement encourages people to slow down their pace of life and appreciate the present moment. One of the key principles ofslow living is the emphasis on local and sustainable consumption.The fast-paced modern world has led to increased stress, anxiety, and a sense of being overwhelmed. Many people feel that they are constantly chasing after time, and they often forget to take care of their physical and mental health. Slow living advocates believe that by reducing the pace of life, individuals can achieve a better work-life balance and lead a more fulfilling life.One way to practice slow living is by supporting local businesses and consuming locally produced goods. This not only helps to strengthen the local economy but also reduces the carbon footprint associated with long-distance transportation. For example, buying fresh produce from local farmers’ markets not only supports local agriculture but also ensures that the food is fresh and nutritious.Moreover, slow living encourages people to connect with others and build strong communities. Activities such as cooking together, sharing meals, and engaging in community service are all part of the slow living philosophy. These activities foster a sense of belonging and reduce social isolation.However, the transition to slow living can be challenging. It requires a conscious effort to change habits and prioritize experiences over material possessions. It also means being more mindful of one’s consumption and making sustainable choices.Questions:1、What is the main idea of the passage?A) The benefits of fast livingB) The importance of consuming locally produced goodsC) The concept and principles of slow livingD) The challenges of practicing slow living2、According to the passage, what is one of the positive effects of slow living?A) Increased stress and anxietyB) A better work-life balanceC) Higher levels of social isolationD) Less appreciation for the present moment3、Why is supporting local businesses important in the context of slow living?A) It helps to reduce the carbon footprint of long-distance transportationB) It encourages people to consume more material possessionsC) It promotes global economic dominanceD) It leads to the decline of local agricultureAnswers:1、C2、B3、A第三题Passage OneWhen it comes to working with animals, you might think of a veterinarian,a person who treats sick animals. But in the United States, some people work with animals without treating them. They train them to do certain things. These people are known as animal trainers.The work of an animal trainer can be difficult. Not all animals are willing to do what they are asked. Sometimes, a trainer has to work for hours without getting any results. But when an animal finally performs a task correctly, the trainer feels a great sense of satisfaction.Many animal trainers work with animals that perform in shows. These animals might be seen in circuses, zoos, or on television. They can also be seen in commercials. Animal trainers work with many different kinds of animals. Some work with dogs, cats, and other pets. Others work with animals that are not pets, such as horses, dolphins, and even bears.Animal trainers use different methods to train animals. They use positive reinforcement, which means that they reward an animal when it does something right. They also use negative reinforcement, which means that they punish an animal when it does something wrong. Some trainers use a combination of both methods.Training animals can be dangerous. A trainer might be bitten or scratched by an animal. Even when an animal seems friendly, it can still be unpredictable. That’s why animal trainers must be careful and patient.Questions:1、What is the main purpose of the passage?A. To describe the difficulties faced by animal trainers.B. To explain the different methods used by animal trainers.C. To discuss the various types of animals that animal trainers work with.D. To introduce the concept of animal trainers and their work.2、According to the passage, how do animal trainers feel when an animal finally performs a task correctly?A. DisappointedB. AnnoyedC. SatisfiedD. Bored3、What is one potential danger associated with being an animal trainer?A. Being late for workB. Not getting enough sleepC. Being bitten or scratched by an animalD. Forgetting to feed the animalsAnswers:1、D2、C3、C五、阅读理解-词汇理解(填空题,共5分)第一题Read the following passage and then answer the questions by choosing the most suitable word for each blank from the four choices given below.In the fast-paced modern world, technology has become an indispensable part of our daily lives. It has revolutionized the way we communicate, work, and even how we interact with others. One of the most significant advancements in technology is the internet, which has transformed the way we access information and connect with people from all over the world.However, despite its numerous benefits, technology also poses several challenges. One of the most pressing issues is the impact it has on our mental health. Excessive use of smartphones and other electronic devices can lead to problems such as anxiety, depression, and sleep disorders. Additionally, the internet has made it easier for people to become victims of cyberbullying and online scams.1、It is crucial to maintain a balance between technology and our personal lives to ensure a healthy lifestyle.2、The internet has made it easier for people to access information, but it has also increased the risk of falling victim to online scams.3、Excessive use of smartphones and other electronic devices can have severe consequences for our mental health.4、In today’s world, technology has become an integral part of our daily lives.5、One of the challenges of technology is the negative impact it can haveon our mental well-being.A. indispensableB. revolutionizeC. accessD. cyberbullyingE. indispensableF. revolutionizeG. accessH. cyberbullying答案1、A2、H3、D4、E5、B第二题Reading PassageAs the world becomes increasingly interconnected, the importance of cultural competence has become more pronounced. Cultural competence refers to the ability to understand, appreciate, and interact effectively with people from different cultural ba ckgrounds. This skill is particularly valuable in today’s globalized economy, where companies and organizations are more likely to work with international partners and clients.One key aspect of cultural competence is the ability to communicate effectively across cultures. This involves not only understanding the linguistic differences but also being aware of the non-verbal cues and social norms that vary from one culture to another. For example, a high-context culture, like Japan, relies heavily on non-verbal communication and indirect communication, while a low-context culture, like the United States, tends to value direct and explicit communication.The following passage contains vocabulary that may be new to you. Choose the most appropriate word from the list below to complete each sentence. Thereare more words than sentences, so there will be some extra words. Do not use any of the words more than once.Vocabulary List:1.Acculturation2.Cohesion3.Diversify4.Harmony5.Integration6.Intricate7.Mnemonic8.Paradoxical9.Proliferate10.SynergySentences:1、The company has decided to__________their workforce to better represent the diversity of their client base.2、After years of living abroad, she felt a sense of__________with her new culture.3、The manager emphasized the importance of cultural__________in order to foster a positive work environment.4、The museum exhibit showcased the__________designs of various civilizations throughout history.5、To remember the names of all the new employees, he used a__________device to create memorable associations.Answers:1.Diversify2.Acculturation3.Cohesion4.Intricate5.Mnemonic六、阅读理解-长篇阅读(选择题,共10分)第一题Reading Passage OneIn recent years, there has been a growing concern about the impact of social media on young people’s mental health. While social media platforms offer numerous benefits, such as connectivity and access to information, they also pose significant risks to the mental well-being of users, especially teenagers. This passage explores the effects of social media on young people’s mental health and discusses potential solutions to mitigate these risks.Paragraph 1Social media has become an integral part of daily life for many young people. Platforms like Instagram, Facebook, and Twitter allow teenagers to connect with friends, share experiences, and express themselves. However, this constantexposure to the curated lives of others can lead to feelings of inadequacy, anxiety, and depression.Questions:1、What is the main concern expressed in the first paragraph?A. The benefits of social media.B. The risks of social media.C. The impact of social media on daily life.D. The role of social media in teenagers’ lives.2、According to the passage, which of the following is a potential negative effect of social media on young people’s mental health?A. Increased self-esteem.B. Enhanced social skills.C. Reduced feelings of inadequacy.D. Heightened anxiety and depression.Paragraph 2Research has shown that excessive use of social media can lead to sleep disturbances, as teenagers spend more time on their devices rather than getting enough rest. Additionally, the constant need for validation and approval from peers can contribute to feelings of low self-worth and anxiety.Questions:3、What is one consequence of excessive social media use mentioned in the second paragraph?A. Improved sleep quality.B. Increased self-worth.C. Reduced anxiety.D. Sleep disturbances.4、Which of the following is NOT mentioned as a potential negative effect of social media use on mental health?A. Anxiety.B. Depression.C. Improved social skills.D. Sleep disturbances.Paragraph 3To address these issues, some experts suggest implementing stricter regulations on social media platforms, such as age restrictions and content filtering. Others argue that parents and educators should play a more active role in monitoring and guiding youn g people’s use of social media.Questions:5、What measures are suggested to mitigate the negative effects of social media on young people’s mental health?A. Implementing stricter regulations on social media platforms.B. Encouraging young people to use social media more frequently.C. Reducing the amount of time spent on social media.D. Ignoring the potential risks of social media.Answers:1、B2、D3、D4、C5、A第二题Reading Time: 40 minutesDirections: For this part, you are allowed 40 minutes to read a long passage and answer the questions on it. You should write your answers on the Answer Sheet.Passage:In the digital age, the way we communicate has undergone a remarkable transformation. With the advent of the internet and various digital platforms, the traditional methods of communication such as postal mail and landline phones have become less prominent. One of the most influential digital communication tools is social media. Platforms like Facebook, Twitter, and Instagram have revolutionized the way people connect and share information. However, along with these advancements come challenges and concerns.1、The first challenge of digital communication is the potential for misinterpretation. Without the nuances of face-to-face communication,text-based messages can be easily misunderstood. This can lead to misunderstandings, conflicts, and even legal disputes.2、Another significant challenge is the issue of privacy. With the vast amount of p ersonal data being shared online, individuals’ privacy is at risk. Cybersecurity breaches have become increasingly common, and the consequences can be severe, ranging from identity theft to financial loss.3、Despite these challenges, digital communication offers numerous benefits. It allows people to connect with others across the globe instantaneously. This has facilitated international collaborations, business partnerships, and cultural exchanges. Additionally, digital communication is cost-effective and time-efficient.4、However, there are concerns about the impact of digital communication on face-to-face interactions. Some argue that excessive reliance on digital communication leads to a decline in interpersonal skills and the ability to engage in meaningful conversations.5、The following questions are based on the passage above.Questions:1、What is the main challenge of digital communication mentioned in the passage?A) Lack of face-to-face interactionB) Potential for misinterpretationC) High cost of communicationD) Difficulty in maintaining privacy2、Which of the following is NOT a challenge of digital communicationaccording to the passage?A) Privacy issuesB) Instantaneous connection with people worldwideC) Decline in interpersonal skillsD) Cybersecurity breaches3、What benefit of digital communication is mentioned in the passage?A) Increased risk of legal disputesB) Cost-effectiveness and time efficiencyC) Decline in face-to-face interactionsD) Enhanced cybersecurity4、What concern is raised about the impact of digital communication on face-to-face interactions?A) It leads to a decrease in the ability to engage in meaningful conversations.B) It increases the risk of cybersecurity breaches.C) It causes a decline in interpersonal skills.D) It leads to misunderstandings and conflicts.5、Which of the following is a positive aspect of digital communication mentioned in the passage?A) Increased risk of legal disputesB) Cost-effectiveness and time efficiencyC) Decline in interpersonal skillsD) Difficulty in maintaining privacyAnswers:1、B2、B3、B4、A5、B七、阅读理解-仔细阅读(选择题,共20分)第一题Reading Passage 1Questions 1 to 5 are based on the following passage.The digital revolution has transformed the way we live, work, and communicate. One of the most significant impacts has been on education. Online learning platforms, virtual classrooms, and educational apps have become increasingly popular, offering new opportunities for students and educators alike.In many countries, traditional classrooms are being augmented with digital tools and resources. Teachers are incorporating interactive whiteboards, tablets, and educational software into their lessons to enhance student engagement and understanding. This integration of technology has led to a more dynamic and engaging learning environment.However, the digital transformation of education also raises concerns aboutits impact on students’ social skills and mental health. Some argue that excessive reliance on digital devices can lead to isolation and anxiety, especially for younger students who are still developing their social and emotional abilities.Despite these concerns, the benefits of digital education are undeniable. Online learning platforms provide access to a vast array of resources that can supplement traditional classroom teaching. Students can access educational materials from around the world, engage in collaborative projects with peers, and receive personalized learning experiences tailored to their individual needs.1、What is one of the significant impacts of the digital revolution on education?A. Increased access to educational resources.B. Improved social skills among students.C. Reduction in teacher workload.D. Enhanced classroom engagement.2、How are digital tools and resources being used in traditional classrooms?A. To replace textbooks and traditional teaching methods.B. To augment existing teaching methods and enhance engagement.C. To reduce the number of students in each classroom.D. To provide students with more time for independent study.3、What is a concern raised about the digital transformation of education?A. The increase in the number of educational apps available.B. The potential negative impact on students’ social skills and mental health.C. The reduction in the quality of classroom instruction.D. The loss of interest in traditional learning methods.4、What is one of the benefits of online learning platforms?A. They require students to work independently at all times.B. They limit studen ts’ access to educational materials from other countries.C. They provide personalized learning experiences for each student.D. They are only useful for students who are already highly motivated to learn.5、How does the passage describe the role of digital tools and resources in education?A. They are a complete replacement for traditional teaching methods.B. They are being used to supplement and enhance traditional teaching methods.C. They are only beneficial for students who have access to advanced technology.D. They are being used to reduce the number of students in each classroom.Answers:1、A. Increased access to educational resources.。

情报法英文版翻译

情报法英文版翻译

情报法英文版翻译Introduction:Intelligence law is a crucial legal framework that governs the collection, analysis, and dissemination of intelligence information. It plays a pivotal role in ensuring national security, upholding human rights, and protecting individual privacy rights. This document provides a translation of the key provisions in the intelligence law to facilitate a comprehensive understanding of its scope and implications.Chapter 1: General Provisions1.1 PurposeThe purpose of this law is to establish a legal foundation for intelligence work, safeguard national security and interests, protect citizens' rights and interests, and promote the lawful and standardized development of intelligence activities.1.2 ScopeThis law applies to intelligence activities carried out within the territory of our country, the intelligence activities conducted overseas by relevant organizations, as well as the intelligence cooperation and exchanges with foreign countries.Chapter 2: Intelligence Collection and Handling2.1 Intelligence CollectionIntelligence collection refers to the systematic and planned acquisition of information that is related tonational security, foreign affairs, defense, and counterterrorism. It should be carried out in accordance withthe law, respecting international conventions, and protecting individual privacy rights.2.2 Intelligence HandlingIntelligence handling involves the processing, analysis, and evaluation of collected information. It should adhere to the principles of objectivity, accuracy, confidentiality, and relevance. The responsible authorities shall ensure that intelligence reports are promptly disseminated to therelevant departments or individuals for appropriate action.Chapter 3: Intelligence Oversight and Accountability3.1 Oversight MechanismsTo ensure the legality and legitimacy of intelligence activities, a comprehensive oversight mechanism shall be established. This includes regular audits, inspections, and reporting requirements to monitor and evaluate the effectiveness and compliance of intelligence operations.3.2 AccountabilityAny violations of this law or abuses of intelligence powers shall be subject to investigation, disciplinary action, and, if necessary, legal prosecution. Individuals or organizations found guilty of misconduct shall be held accountable according to the law.Chapter 4: Intelligence Cooperation4.1 International CooperationInternational intelligence cooperation plays a crucialrole in maintaining global security and combatingtransnational threats. Our country is committed to promoting international exchanges and cooperation within the frameworkof bilateral and multilateral agreements, with due respect to international laws and practices.4.2 Information SharingInformation sharing among intelligence agencies is essential for effective coordination and joint efforts in combating terrorism, transnational organized crime, and other security challenges. The responsible authorities shall establish secure channels and mechanisms for sharing intelligence in a timely and appropriate manner.Conclusion:The translation of the Intelligence Law provides a comprehensive understanding of the legal framework governing intelligence activities. It emphasizes the importance of adherence to the law, protection of individual privacy rights, and accountability of intelligence agencies. By promoting legality, oversight, and cooperation, this law aims to ensure national security while upholding human rights andinternational obligations.。

新视野大学英语(第三版)读写教程第(二)册课文翻译 text A

新视野大学英语(第三版)读写教程第(二)册课文翻译 text A

新视野大学英语第三版第二册读写课文翻译Unit 1 Text A一堂难忘的英语课1 如果我是唯一一个还在纠正小孩英语的家长,那么我儿子也许是对的。

对他而言,我是一个乏味的怪物:一个他不得不听其教诲的父亲,一个还沉湎于语法规则的人,对此我儿子似乎颇为反感。

2 我觉得我是在最近偶遇我以前的一位学生时,才开始对这个问题认真起来的。

这个学生刚从欧洲旅游回来。

我满怀着诚挚期待问她:“欧洲之行如何?”3 她点了三四下头,绞尽脑汁,苦苦寻找恰当的词语,然后惊呼:“真是,哇!”4 没了。

所有希腊文明和罗马建筑的辉煌居然囊括于一个浓缩的、不完整的语句之中!我的学生以“哇!”来表示她的惊叹,我只能以摇头表达比之更强烈的忧虑。

5 关于正确使用英语能力下降的问题,有许多不同的故事。

学生的确本应该能够区分诸如their/there/they're之间的不同,或区别complimentary 跟complementary之间显而易见的差异。

由于这些知识缺陷,他们承受着大部分不该承受的批评和指责,因为舆论认为他们应该学得更好。

6 学生并不笨,他们只是被周围所看到和听到的语言误导了。

举例来说,杂货店的指示牌会把他们引向stationary(静止处),虽然便笺本、相册、和笔记本等真正的stationery(文具用品)并没有被钉在那儿。

朋友和亲人常宣称They've just ate。

实际上,他们应该说They've just eaten。

因此,批评学生不合乎情理。

7 对这种缺乏语言功底而引起的负面指责应归咎于我们的学校。

学校应对英语熟练程度制定出更高的标准。

可相反,学校只教零星的语法,高级词汇更是少之又少。

还有就是,学校的年轻教师显然缺乏这些重要的语言结构方面的知识,因为他们过去也没接触过。

学校有责任教会年轻人进行有效的语言沟通,可他们并没把语言的基本框架——准确的语法和恰当的词汇——充分地传授给学生。

8 因为语法对大多数年轻学生而言枯燥且乏味,所以我觉得讲授语法得一步一步、注重技巧地进行。

Chaos… of a dripping faucet - University of Roches

Chaos… of a dripping faucet - University of Roches
New Code
commented much shorter writes differences of time (only important data)
Old Code
M acintosh PICT im age form at
is not supported
New Code
CompDutAeTrAlagArNesAuLltYsSinISm: isSsoedurdcroepssof Error
Logistic Map: Comparing Successive Drops
The “Spectrum” of Drop Frequency
Time(sec) # Drops
Time(sec)
Time(ms)
DROPPER A (1.9 mm) 21.41 DROPS/SEC
Logistic Map: Comparing Successive Drops
Time(sec)
Time(ms)
DROPPER B (0.45 mm) 11.10 DROPS/SEC
Logistic Map: Comparing Successive Drops
The “Spectrum” of Drop Frequency
Time(sec) # Drops
Time(sec)
CHAOS… OF A DRIPPING
FAUCET
Dan Allan and
Adam Bublitz
RECONSTRUCTION, PHASE 2
Consequence of trying to fix missed data
rewrote the LabView vi
Old Code

考研英语 全国研究生入学考试2012年英语真题及答案

考研英语   全国研究生入学考试2012年英语真题及答案

考研英语全国研究生入学考试2012年英语真题及答案Section I Use of EnglishDirections:Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C or D on ANSWER SHEET 1. (10 points)Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C or D on ANSWER SHEET 1. (10 points)The ethical judgments of the Supreme Court justices have become an important issue recently. The court cannot _1_ its legitimacy as guardian of the rule of law _2_ justices behave like politicians. Yet, in several instances, justices acted in ways that _3_ the court’s reputation for being independent and impartial.Justice Antonin Scalia, for example, appeared at political events. That kind of activity makes it less likely that the court’s decisions will be _4_ as impartial judgments. Part of the problem is that the justices are not _5_by an ethics code. At the very least, the court should make itself _6_to the code of conduct that _7_to the rest of the federal judiciary.This and other similar cases _8_the question of whether there is still a _9_between the court and politics.The framers of the Constitution envisioned law _10_having authority apart from politics. They gave justices permanent positions _11_they would be free to _12_ those in power and have no need to _13_ political support. Our legal system was designed to set law apart from politics precisely because they are so closely _14_.Constitutional law is political because it results from choices rooted in fundamental social _15_ like liberty and property. When the court deals with social policy decisions, the law it _16_ is inescapably political-which is why decisions split along ideological lines are so easily _17_ as unjust.The justices must _18_ doubts about the court’s legitimacy by making themselves _19_ to the code of conduct. That would make rulings more likely to be seen as separate from politics and, _20_, convincing as law.1. [A]emphasize [B]maintain [C]modify [D] recognize2. [A]when [B]lest [C]before [D] unless3. [A]restored [B]weakened [C]established [D] eliminated4. [A]challenged [B]compromised [C]suspected [D] accepted5. [A]advanced [B]caught [C]bound [D]founded6. [A]resistant [B]subject [C]immune [D]prone7. [A]resorts [B]sticks [C]loads [D]applies8. [A]evade [B]raise [C]deny [D]settle9. [A]line [B]barrier [C]similarity [D]conflict10. [A]by [B]as [C]though [D]towards11. [A]so [B]since [C]provided [D]though12. [A]serve [B]satisfy [C]upset [D]replace13. [A]confirm [B]express [C]cultivate [D]offer14. [A]guarded [B]followed C]studied [D]tied15. [A]concepts [B]theories [C]divisions [D]conceptions16. [A]excludes [B]questions [C]shapes [D]controls17. [A]dismissed [B]released [C]ranked [D]distorted18. [A]suppress [B]exploit [C]address [D]ignore19. [A]accessible [B]amiable [C]agreeable [D]accountable20. [A]by all mesns [B]atall costs [C]in a word [D]as a resultSection II Reading ComprehensionPart ADirections:Read the following four texts. Answer the questions below each text by choosing A, B, C or D. Mark your answerson ANSWER SHEET 1. (40 points)Text 1Come on –Everybody’s doing it. That whispered message, half invitation and half forcing, is what most of us think of when we hear the words peer pressure. It usually leads to no good-drinking, drugs and casual sex. But in her new book Join the Club, Tina Rosenberg contends that peer pressure can also be a positive force through what she callsthe social cure, in which organizations and officials use the power of group dynamics to help individuals improvetheir lives and possibly the word.Rosenberg, the recipient of a Pulitzer Prize, offers a host of example of the social cure in action: In South Carolina, a state-sponsored antismoking program called Rage Against the Haze sets out to make cigarettes uncool. In South Africa, an HIV-prevention initiative known as LoveLife recruits young people to promote safe sex among their peers. The idea seems promising,and Rosenberg is a perceptive observer. Her critique of the lameness of manypubic-health campaigns is spot-on: they fail to mobilize peer pressure for healthy habits, and they demonstrate a seriously flawed understanding of psychology.”Dare to be different, please don’t smoke!”pleads one billboard campaign aimed at reducing smoking among teenagers-teenagers, who desire nothing more than fitting in. Rosenberg argues convincingly that public-health advocates ought to take a page from advertisers, so skilled at applying peer pressure.But on the general effectiveness of the social cure, Rosenberg is less persuasive. Join the Club is filled with too much irrelevant detail and not enough exploration of the social and biological factors that make peer pressure so powerful. The most glaring flaw of the social cure as it’s presented here is that it doesn’t work very well for very long. Rage Against the Haze failed once state funding was cut. Evidence that the LoveLife program produces lasting changes is limited and mixed.There’s no doubt that our peer groups exert enormous influence on our behavior. An emerging body of research shows that positive health habits-as well as negative ones-spread through networks of friends via socialcommunication. This is a subtle form of peer pressure: we unconsciously imitate the behavior we see every day.Far less certain, however, is how successfully experts and bureaucrats can select our peer groups and steer their activities in virtuous directions. It’s like the teacher who breaks up the troublemakers in the back row by pairing them with better-behaved classmates. The tactic never really works. And that’s the problem with a social cure engineered from the outside: in the real world, as in school, we insist on choosing our own friends.21. According to the first paragraph, peer pressure often emerges as[A] a supplement to the social cure[B] a stimulus to group dynamics[C] an obstacle to school progress[D] a cause of undesirable behaviors22. Rosenberg holds that public advocates should[A] recruit professional advertisers[B] learn from advertisers’experience[C] stay away from commercial advertisers[D] recognize the limitations of advertisements23. In the author’s view, Rosenberg’s book fails to[A] adequately probe social and biological factors[B] effectively evade the flaws of the social cure[C] illustrate the functions of state funding[D]produce a long-lasting social effect24. Paragraph 5shows that our imitation of behaviors[A] is harmful to our networks of friends[B] will mislead behavioral studies[C] occurs without our realizing it[D] can produce negative health habits25. The author suggests in the last paragraph that the effect of peer pressure is[A] harmful[B] desirable[C] profound[D] questionableText 2A deal is a deal-except, apparently ,when Entergy is involved. The company, a major energy supplier in New England, provoked justified outrage in Vermont last week when it announced it was reneging on a longstanding commitment to abide by the strict nuclear regulations.Instead, the company has done precisely what it had long promised it would not challenge the constitutionality of Vermont’s rules in the federal court, as part of a desperate effort to keep its Vermont Yankee nuclear power plantrunning. It’s a stunning move.The conflict has been surfacing since 2002, when the corporation bought Vermont’s only nuclear power plant, an aging reactor in Vernon. As a condition of receiving state approval for the sale, the company agreed to seek permission from state regulators to operate past 2012. In 2006, the state went a step further, requiring that any extension of the plant’s license be subject to Vermont legislature’s approval. Then, too, the company went along. Either Entergy never really intended to live by those commitments, or it simply didn’t foresee what would happen next. A string of accidents, including the partial collapse of a cooling tower in 207 and the discovery of an underground pipe system leakage, raised serious questions about both Vermont Yankee’s safety and Entergy’s management–especially after the company made misleading statements about the pipe. Enraged by Entergy’s behavior, the Vermont Senate voted 26 to 4 last year against allowing an extension.Now the company is suddenly claiming that the 2002 agreement is invalid because of the 2006 legislation, and that only the federal government has regulatory power over nuclear issues. The legal issues in the case are obscure: whereas the Supreme Court has ruled that states do have some regulatory authority over nuclear power, legal scholars say that Vermont case will offer a precedent-setting test of how far those powers extend. Certainly, there are valid concerns about the patchwork regulations that could result if every state sets its own rules. But had Entergy kept its word, that debate would be beside the point.The company seems to have concluded that its reputation in Vermont is already so damaged that it has noting left to lose by going to war with the state. But there should be consequences. Permission to run a nuclear plant is a poblic trust. Entergy runs 11 other reactors in the United States, including Pilgrim Nuclear station in Plymouth. Pledging to run Pilgrim safely, the company has applied for federal permission to keep it open for another 20 years. But as the Nuclear Regulatory Commission (NRC) reviews the company’s application, it should keep it mind what promises from Entergy are worth.26. The phrase “reneging on”(Line 3.para.1) is closest in meaning to[A] condemning.[B] reaffirming.[C] dishonoring.[D] securing.27. By entering into the 2002 agreement, Entergy intended to[A] obtain protection from Vermont regulators.[B] seek favor from the federal legislature.[C] acquire an extension of its business license .[D] get permission to purchase a power plant.28. According to Paragraph 4, Entergy seems to have problems with its[A] managerial practices.[B] technical innovativeness.[C] financial goals.[D] business vision29. In the author’s view, the Vermont case will test[A] Entergy’s capacity to fulfill all its promises.[B] the mature of states’patchwork regulations.[C] the federal authority over nuclear issues .[D] the limits of states’power over nuclear issues.30. It can be inferred from the last paragraph that[A] Entergy’s business elsewhere might be affected.[B] the authority of the NRC will be defied.[C] Entergy will withdraw its Plymouth application.[D] Vermont’s reputation might be damaged.Text 3In the idealized version of how science is done, facts about the world are waiting to be observed and collected by objective researchers who use the scientific method to carry out their work. But in the everyday practice of science, discovery frequently follows an ambiguous and complicated route. We aim to be objective, but we cannot escape the context of our unique life experience. Prior knowledge and interest influence what we experience, what we think our experiences mean, and the subsequent actions we take. Opportunities for misinterpretation, error, and self-deception abound.Consequently, discovery claims should be thought of as protoscience. Similar to newly staked mining claims, they are full of potential. But it takes collective scrutiny and acceptance to transform a discovery claim into a mature discovery. This is the credibility process, through which the individual researcher’s me, here, now becomes the community’s anyone, anywhere, anytime. Objective knowledge is the goal, not the starting point.Once a discovery claim becomes public, the discoverer receives intellectual credit. But, unlike with mining claims,the community takes control of what happens next. Within the complex social structure of the scientific community,researchers make discoveries; editors and reviewers act as gatekeepers by controlling the publication process; other scientists use the new finding to suit their own purposes; and finally, the public (including other scientists) receives the new discovery and possibly accompanying technology. As a discovery claim works it through the community, the interaction and confrontation between shared and competing beliefs about the science and the technology involved transforms an individual’s discovery claim into the community’s credible discovery.Two paradoxes exist throughout this credibility process. First, scientific work tends to focus on some aspect of prevailing Knowledge that is viewed as incomplete or incorrect. Little reward accompanies duplication and confirmation of what is already known and believed. The goal is new-search, not re-search. Not surprisingly, newly published discovery claims and credible discoveries that appear to be important and convincing will always be open to challenge and potential modification or refutation by future researchers. Second, novelty itself frequently provokes disbelief. Nobel Laureate and physiologist Albert Azent-Gyorgyi once described discovery as “seeing what everybody has seen and thinking what nobody has thought.”But thinking what nobody else has thought and telling others what they have missed may not change their views. Sometimes years are required for truly novel discovery claims to be accepted and appreciated.In the end, credibility “happens”to a discovery claim –a process that corresponds to what philosopher Annette Baierhas described as the commons of the mind. “We reason together, challenge, revise, and complete each other’s reasoning and each other’s conceptions of reason.”31. According to the first paragraph, the process of discovery is characterized by its[A] uncertainty and complexity.[B] misconception and deceptiveness.[C] logicality and objectivity.[D] systematicness and regularity.32. It can be inferred from Paragraph 2 that credibility process requires[A] strict inspection.[B]shared efforts.[C] individual wisdom.[D]persistent innovation.33.Paragraph 3 shows that a discovery claim becomes credible after it[A] has attracted the attention of the general public.[B]has been examined by the scientific community.[C] has received recognition from editors and reviewers.[D]has been frequently quoted by peer scientists.34. Albert Szent-Gy.rgyi would most likely agree that[A] scientific claims will survive challenges.[B]discoveries today inspire future research.[C] efforts to make discoveries are justified.[D]scientific work calls for a critical mind.35.Which of the following would be the best title of the test?[A] Novelty as an Engine of Scientific Development.[B]Collective Scrutiny in Scientific Discovery.[C] Evolution of Credibility in Doing Science.[D]Challenge to Credibility at the Gate to Science.Text 4If the trade unionist Jimmy Hoffa were alive today, he would probably represent civil servant. When Hoffa’s Teamsters were in their prime in 1960, only one in ten American government workers belonged to a union; now 36% do. In 2009 the number of unionists in America’s public sector passed that of their fellow members in the private sector. In Britain, more than half of public-sector workers but only about 15% of private-sector ones are unionized. There are three reasons for the public-sector unions’thriving. First, they can shut things down without sufferingmuch in the way of consequences. Second, they are mostly bright and well-educated. A quarter of America’s public-sector workers have a university degree. Third, they now dominate left-of-centre politics. Some of their ties go back a long way. Britain’s Labor Party, as its name implies, has long been associated with trade unionism. Its current leader, Ed Miliband, owes his position to votes from public-sector unions.At the state level their influence can be even more fearsome. Mark Baldassare of the Public Policy Institute of California points out that much of the state’s budget is patrolled by unions. The teachers’unions keep an eye on schools, the CCPOA on prisons and a variety of labor groups on health care.In many rich countries average wages in the state sector are higher than in the private one. But the real gains come in benefits and work practices. Politicians have repeatedly “backloaded”public-sector pay deals, keeping the pay increases modest but adding to holidays and especially pensions that are already generous.Reform has been vigorously opposed, perhaps most egregiously in education, where charter schools, academies and merit pay all faced drawn-out battles. Even though there is plenty of evidence that the quality of the teachers is the most important variable, teachers’unions have fought against getting rid of bad ones and promoting good ones. As the cost to everyone else has become clearer, politicians have begun to clamp down. In Wisconsin the unions have rallied thousands of supporters against Scott Walker, the hardline Republican governor. But many within the public sector suffer under the current system, too.John Donahue at Harvard’s Kennedy School points out that the norms of culture in Western civil services suit those who want to stay put but is bad for high achievers. The only American public-sector workers who earn well above $250,000 a year are university sports coaches and the president of the United States. Bankers’fat pay packets have attracted much criticism, but a public-sector system that does not reward high achievers may be a much bigger problem for America.36. It can be learned from the first paragraph that[A] Teamsters still have a large body of members.[B] Jimmy Hoffa used to work as a civil servant.[C] unions have enlarged their public-sector membership.[D]the government has improved its relationship with unionists.37. Which of the following is true of Paragraph 2?[A] Public-sector unions are prudent in taking actions.[B] Education is required for public-sector union membership.[C] Labor Party has long been fighting against public-sector unions.[D]Public-sector unions seldom get in trouble for their actions.38. It can be learned from Paragraph 4 that the income in the state sector is[A] illegally secured.[B] indirectly augmented.[C] excessively increased.[D]fairly adjusted.39. The example of the unions in Wisconsin shows that unions[A]often run against the current political system.[B]can change people’s political attitudes.[C]may be a barrier to public-sector reforms.[D]are dominant in the government.40. John Donahue’s attitude towards the public-sector system is one of[A]disapproval.[B]appreciation.[C]tolerance.[D]indifference.Part BDirections:In the following text, some sentences have been removed. For Questions 41-45, choose the most suitable one from the list A-G to fit into each of the numbered blanks. There are two extra choices, which do not fit in any of the blanks. Mark your answers on ANSWER SHEET1.(10 points)Think of those fleeting moments when you look out of an aeroplane window and realise that you are flying, higher than a bird. Now think of your laptop, thinner than a brown-paper envelope, or your cellphone in the palm of your hand. Take a moment or two to wonder at those marvels. You are the lucky inheritor of a dream come true.The second half of the 20th century saw a collection of geniuses, warriors, entrepreneurs and visionaries labour to create a fabulous machine that could function as a typewriter and printing press, studio and theatre, paintbrush and gallery, piano and radio, the mail as well as the mail carrier. (41)The networked computer is an amazing device, the first media machine that serves as the mode of production, means of distribution, site of reception, and place of praise and critique. The computer is the 21st century's culture machine. But for all the reasons there are to celebrate the computer, we must also tread with caution. (42)I call it a secret war for two reasons. First, most people do not realise that there are strong commercial agendas at work to keep them in passive consumption mode. Second, the majority of people who use networked computers to upload are not even aware of the significance of what they are doing.All animals download, but only a few upload. Beavers build dams and birds make nests. Yet for the most part, the animal kingdom moves through the world downloading. Humans are unique in their capacity to not only make tools but then turn around and use them to create superfluous material goods - paintings, sculpture and architecture - and superfluous experiences - music, literature, religion and philosophy. (43)For all the possibilities of our new culture machines, most people are still stuck in download mode. Even after the advent of widespread social media, a pyramid of production remains, with a small number of people uploadingmaterial, a slightly larger group commenting on or modifying that content, and a huge percentage remaining content to just consume. (44)Television is a one-way tap flowing into our homes. The hardest task that television asks of anyone is to turn the power off after he has turned it on.(45)What counts as meaningful uploading? My definition revolves around the concept of "stickiness" - creations and experiences to which others adhere.[A] Of course, it is precisely these superfluous things that define human culture and ultimately what it is to be human. Downloading and consuming culture requires great skills, but failing to move beyond downloading is to strip oneself of a defining constituent of humanity.[B] Applications like , which allow users to combine pictures, words and other media in creative waysand then share them, have the potential to add stickiness by amusing, entertaining and enlightening others.[C] Not only did they develop such a device but by the turn of the millennium they had also managed to embed it in a worldwide system accessed by billions of people every day.[D] This is because the networked computer has sparked a secret war between downloading and uploading - between passive consumption and active creation - whose outcome will shape our collective future in ways we can only beginto imagine.[E] The challenge the computer mounts to television thus bears little similarity to one format being replaced by another in the manner of record players being replaced by CD players.[F] One reason for the persistence of this pyramid of production is that for the past half-century, much of the world's media culture has been defined by a single medium - television - and television is defined by downloading.[G]The networked computer offers the first chance in 50 years to reverse the flow, to encourage thoughtful downloading and, even more importantly, meaningful uploading.Part CDirections:Read the following text carefully and then translate the underlined segments into Chinese. Yourtranslation should be written clearly on ANSWER SHEET 2. (10 points)Since the days of Aristotle, a search for universal principles has characterized the scientific enterprise.In some ways, this quest for commonalities defines science. Newton’s laws of motion and Darwinianevolution each bind a host of different phenomena into a single explicatory frame work.(46)In physics, one approach takes this impulse for unification to its extreme, and seeks a theory of everything—a single generative equation for all we see.It is becoming less clear, however, that such atheory would be a simplification, given the dimensions and universes that it might entail, nonetheless,unification of sorts remains a major goal.This tendency in the natural sciences has long been evident in the social sciences too. (47)Here,Darwinism seems to offer justification for it all humans share common origins it see ms reasonable tosuppose that cultural diversity could also be traced to more constrained beginnings. Just as the bewilderingvariety of human courtship rituals might all be considered forms of sexual selection, perhaps the world’s languages, music, social and religious customs and even history are governed by universal features.(48)To filter out what is unique from what is shared might enable us to understand how complex cultural behavior arose and what guides it in evolutionary or cognitive terms.That, at least, is the hope. But a comparative study of linguistic traits published online today supplies areality check. Russell Gray at the University of Auckland and his colleagues consider the evolution ofgrammars in the light of two previous attempts to find universality in language.The most famous of these efforts was initiated by Noam Chomsky, who suggested that humans areborn with an innate language—acquisition capacity that dictates a universal grammar. A few generativerules are then sufficient to unfold the entire fundamental structure of a language, which is why children canlearn it so quickly.(49)The second, by Joshua Greenberg, takes a more empirical approach to universality identifyingtraits (particularly in word order) shared by many language which are considered to represent biases thatresult from cognitive constraintsGray and his colleagues have put them to the test by examining four family trees that between themrepresent more than 2,000 languages.(50)Chomsky’s grammar should show patterns of language changethat are independent of the family tree or the pathway tracked through it. Whereas Greenbergianuniversality predicts strong co-dependencies between particular types of word-order relations. Neither ofthese patterns is borne out by the analysis, suggesting that the structures of the languages are lireage-specific and not governed by universalsSection III WritingPart A51. Directions:Some internationals students are coming to your university. Write them an email in the name of the Students’Union to1)extend your welcome and provide some suggestions for their campus life here.2)You should write about 100 words on ANSWER SHEET2.Do not sign your name at the end of the letter. Use “Li Ming”instead.Do not write the address(10 points)Part B52. Directions: write an essay of 160-200 words based on the following drawing. In your essay you should1) describe the drawing briefly2) explain its intended meaning, and3) give your commentsYou should write neatly on ANSWER SHEET2.(20 points)2012年全国硕士研究生入学统一考试英语(一)试题答案详解Section I Use of English1.【答案】B【解析】从空后信息可以看出,这句表达的是“_ _法官表现得像政治家”的情况下,法庭就不能保持其作为法律法规的合法卫士的形象,所以应该选C, maintain“维持,保持”,其他显然语义不通。

英语自考大专试题及答案

英语自考大专试题及答案

英语自考大专试题及答案一、选择题(每题2分,共20分)1. The book is ________ interesting that I can't put it down.A) so B) such C) very D) too答案:A2. He is ________ to go to school.A) enough old B) old enough C) enough young D) young enough 答案:B3. ________ the weather is fine, we will go for a picnic.A) Because B) So C) If D) Unless答案:C4. It is ________ to play football in the street.A) dangerous B) danger C) safely D) safe答案:A5. ________ the teacher came in, all the students stood up.A) Before B) As soon as C) While D) After答案:B6. She ________ her keys in the office.A) forgot B) left C) lost D) missed答案:B7. ________ you are here, I have something to tell you.A) Since B) Because C) If D) Unless答案:A8. The teacher asked the students ________ they had finished their homework.A) that B) if C) whether D) what答案:C9. He ________ his hometown for ten years.A) left B) has left C) had left D) has been away from答案:D10. The film is ________ to be continued.A) likely B) probable C) possible D) expected答案:A二、填空题(每题2分,共20分)1. ________ (如果) you don't like the gift, you can return it. 答案:If2. She ________ (已经完成) her homework before I arrived.答案:had finished3. ________ (无论) how hard it rains, we will go out.答案:No matter4. ________ (尽管) he is very young, he is very responsible. 答案:Although5. ________ (因为) he was tired, he went to bed early.答案:Because6. ________ (除非) we have finished our work, we can't go home.答案:Until7. ________ (由于) the heavy rain, the game was postponed. 答案:Due to8. ________ (一旦) you see him, please tell him the news.答案:Once9. ________ (只要) you work hard, you will succeed.答案:As long as10. ________ (除了) the cost of living, she also has to pay for her education.答案:In addition to三、阅读理解(每题3分,共30分)阅读下列短文,然后回答问题。

法律英语翻译——重申米兰达排除规则

法律英语翻译——重申米兰达排除规则

英文原文:Miranda exclusionary rule re-affirmedIn two landmark cases in the 1960s, Mapp v Ohio and Miranda v Arizona, the Supreme Court announced automatic exclusionary rules relating to the Fourth and Fifth Amendments to the United States Constitution. Each rule was applicable in both federal and state cases. According to Mapp , evidence acquired by an unreasonable search or seizure, in breach of the Fourth Amendment, was to be suppressed. Miranda decided that confessions acquired without the police having respected appropriate procedural safeguards were to be excluded by reference to the Fifth Amendment's prohibition on a person being ‘compelled in any criminal case to be a witness against himself’. More specifically, before any custodial interrogation, a suspect should be alerted to certain rights which he possesses. Neither Mapp nor Miranda has enjoyed a trouble-free history, so the decision of the Supreme Court in US v Dickerson to re-affirm the vitality of Miranda, albeit not in the most resounding terms, is of considerable significance. Though the key question for decision was a narrow constitutional one, the case has much wider implications for Fifth (and Fourth) Amendment jurisprudence. It may also have an impact on other common law systems.The unremarkable facts of the case were that Dickerson, suspected of armed robbery, had, whilst being questioned by the police, confessed to that and other similar offences. At a preliminary hearing, the District Court had ruled that all of those confessions had been made before he had been informed of his Miranda rights. Once the case reached the Supreme Court, those were the assumed facts, such that, if Miranda applied, all of his confessions were plainly inadmissible. The issues to be decided were whether Miranda had been overturned in federal cases by Congressional legislation, namely 18 USC §3501, and if not, whether that case should in any event be overturned as a matter of the court's own jurisdiction.Before Miranda, the sole federal rule of inadmissibility for confession evidence was the involuntariness rule. Because involuntary confessions were regarded as entailing compulsion of the suspect to be a witness against himself, they were to be excluded as a matter of constitutional command, and in state cases no less than federal ones. Miranda added a new rule of exclusion, with four elements. Before interrogating a suspect in custody, the police must tell him that he has a right to remain silent, that any statement he might make may be used against him, that he has a right to the presence of an attorney during interrogation, and that an attorney will be appointed for him if he cannot afford one. The Supreme Court had two reasons for announcing the new rule. First, the involuntariness test was too vague to provide a clear and sure test of inadmissibility. So, what could be clearer than that the suspect must be enlightened in the way described in Miranda? Secondly, the atmosphere of custodial interrogation was inherently coercive. If the suspect were to be ‘read his rights’ before interrogation, the result might be a counterbalancing of that atmosphere, such that any confession made would be more likely to be voluntary.However, from the start, both the policy basis for the Miranda doctrine and its legal status were doubtful. As to policy, though the overall message of the opinion of the court was that the doctrine was designed to protect the suspect's personal right not to incriminate himself, there were also intimations of a broader, disciplinary purpose. In essence, Miranda might dissuade officers from exploiting the coercive atmosphere of the police station and, inparticular, from employing the range of dubious tactics recommended by the then-leading interrogation manual. As regards legal status, three of the individual cases decided in Miranda were state cases. In those, ordinary constitutional doctrine dictated that the sole function of the Supreme Court was to enforce (federal) constitutional commands upon the prosecution, and certainly not to impose whatever might be its own opinion of proper interrogation standards. Thus, the majority of the court must have considered that to allow evidence of the confession to be given would entail breach of the Fifth Amendment itself. Yet that belief seemed to lie uneasily with another element of the decision. The fourfold catalogue was not to be an absolute procedural safeguard. Rather, it must be pronounced unless some alternative safeguard were shown to be ‘at least as effective in apprising accused persons of their ri ght to silence and in assuring a continuous opportunity to exercise it’.The Supreme Court is not, qua highest federal court, subject to the same constitutional constraints. Its supervisory jurisdiction over lower courts allows it to prescribe for them rules of procedure and evidence. Any such rules may, however, be superseded or modified by the United States Congress. Only two years after Miranda, Congress enacted 18 USC §3501, a provision undoubtedly designed to supersede Miranda in federal cases. The relevant parts provide that though the judge, in deciding the admissibility issue, should take into account, inter alia , whether or not the items of information in the Miranda catalogue were conveyed to the accused, ‘a confession shall be admissible in evi dence if it is voluntarily given’.Rather surprisingly, successive federal administrations have declined to argue that §3501 does indeed supersede Miranda.Thus, when Dickerson was before the Fourth Circuit Court of Appeals, neither party proposed that conclusion. Nonetheless, that court held that it was bound to apply §3501 and not Miranda. On certiorari , the Supreme Court was equally deprived of prosecution argument in support of §3501.The Supreme Court jurisprudence of the last 30 years or so is strewn with decisions and dicta which contest the interpretation of Miranda as properly issuing a constitutional command. It would be idle here to rehearse them all, and the reader is referred to the rasping dissent of Scalia J (joined in by Thomas J) in Dickerson itself for the detail. However, there are two essential elements thereto. First, evidence has been held to be admissible in several situations notwithstanding a breach of Miranda. So, it is settled that evidence which may not be adduced as part of the prosecution case may be used in cross-examination of an accused who testifies inconsistently with some element of his confession or in rebuttal of that testimony, though as going only to credibility. There is a ‘public safety’ exception, such that it is legitimate for officers not to pronounce the Miranda catalogue where to do so might endanger public safety. Finally, the ordinary ‘fruit of the poisonous tree’ doctrine, which excludes derivative evidence acquired indirectly through breach of a constitutional right, is inapplicable to Miranda breaches. There are no equivalent exceptions to the involuntary confessions rule.Secondly, the Supreme Court's post-Miranda opinions contain numerous affirmations that the doctrine is no more than a prophylactic one, announcing rights which are not themselves constitutionally protected. That position has never been better explained than by Rehnquist J (as he then was) in Michigan v Tucker , where he said that they were:not themselves rights protected by the Constitution but were instead measures to insure that the right against compulsory self-incrimination was protected…[and to] …provide practical reinforcement for the right…In Dickerson , Rehnquist CJ (as he now is), delivering an opinion in which six other justices joined, has, whilst conceding that there is language in some of the court's opinions supporting the view that the Miranda doctrine is not one of constitutional command, resiled from statements such as his own in Michigan v Tucker. Rather, Miranda ‘announced a constitutional rule that Congress may not supersede legislatively’. The opinion avers that Miranda itself is ‘replete with statements indicating that the majority thought it was announcing a constitutional rule’. Moreover, how else could it apply to the states, given that the Supreme Court has no supervisory jurisdiction? The opinion also finds support in two recent cases in the Supreme Court deciding that Miranda breaches may be relied upon in federal habeas corpus proceedings, it being well established that only those claiming a violation of federal law, and in particular of the United States Constitution, may bring such proceedings.Perhaps the most interesting observation of the majority is one contained only in a footnote. In answer to the argument that the Miranda catalogue cannot be constitutionally required once it be conceded that other, equally effective, procedural safeguards would suffice, Rehnquist CJ said that the relevant ‘disclaimer’ in Miranda :was intended to indicate that the Constitution does not require police to administer the particular Miranda warnings, not that the Constitution does not require a procedure that is effective in securing Fifth Amendment rights.In other words, some counterbalance adequate to safeguard against the coercive atmosphere is all that is necessary, but, absent some alternative showing, compliance with Miranda will alone suffice.Of course, the Supreme Court could have found §3501 to be invalid, yet itself have overruled Miranda. That it declined to do, though in terms which hardly provide a ringing endorsement of the philosophy behind the case. As Rehnquist CJ put it:whether or not we would agree with Miranda's reasoning and its resulting rule were we addressing the issue in the first instance, the principles of stare decisis weigh heavily against overruling it now.In a dissent which many will find more persuasive than the majority opinion as a matter of constitutional doctrine and legal precedent, Scalia J (joined by Thomas J) remarked upon the unwillingness of the majority expressly to say that a breach of Miranda is a breach of the Constitution, rather than merely that Miranda was a ‘constitutional decision’ or was ‘constitutionally based’ or had ‘constitutional underpinnings’. Moreover, he was n ot prepared to see so many Supreme Court authorities and statements about Miranda put to one side as simply misleading. Certainly, the upshot of his dissent was not only that §3501 was good law, but also that the states should be released from the shackles of Miranda.As to the future, it is hard to believe that the Supreme Court will not be faced with challenges to the various exceptions so carefully carved out of Miranda.Though it is true that Rehnquist CJ referred to the decision's ‘coreruling that un warned statements may not be used as evidence in the prosecution's case in chief’ as what was now reaffirmed, it will be difficult indeed for the Supreme Court to hold that use which breaches a constitutional rule when in chief does not breach one when in cross-examination. If Miranda really is a companion of the involuntariness rule, it should have the same consequences as that rule. And why should the public safety and derivative evidence exceptions continue to apply here, yet not under the involuntariness rule?Dickerson may also turn out to have significance for the Fourth Amendment exclusionary rule. Mapp v Ohio is a more promising candidate than Miranda for constitutional rule status in one respect, but a less promising one in another. Positively, the Fourth Amendment explicitly outlaws unreasonable searches and seizures, whilst there is nothing in the Fifth Amendment about either a right to silence or a right to a lawyer. Negatively, it is hard to conceive of evidence acquired by (unconstitutional) co mpulsion of a ‘witness’ being admissible, easier to think of the remedy for unreasonable search or seizure being other than that of inadmissibility. One must add that it is clear law that federal habeas corpus proceedings cannot be used to challenge the admissibility of evidence acquired in breach of the Fourth Amendment. At all events, modern Supreme Court jurisprudence is replete with language displaying a conception of the Mapp rule essentially the same as the pre-Dickerson conception of Miranda. In an oft-quoted passage, Powell J said that:the rule is a judicially created remedy designed to safeguard Fourth Amendment rights generally through its deterrent effect, rather than a personal constitutional right of the party aggrieved.There is no equivalent of §3501 for the Fourth Amendment rule, but statements of that kind are now more open than before to objection as a matter of constitutional doctrine. If there is in truth a personal constitutional right here too, then it becomes untenable to argue that no such right is enjoyed by an accused denied his substantive Fourth Amendment rights by police officers acting in objective good faith reliance on a warrant, yet such reliance does at present allow of an exception to the exclusionary rule.The possible impact of Dickerson upon other common law jurisdictions is plainly less easy to predict. Mapp and Miranda were the watchwords of a generation of scholars and others who preferred what is known as the ‘due process’ model of criminal procedure to the ‘crime control’ model. It is as though, having poured a stiff scotch in Miranda , the Supreme Court later proceeded to dilute it with such ample draughts of water that it became hard to taste the whisky. Something rather similar might be said about Mapp. Having led the common law world on these matters in the 1960s, the Supreme Court's all-too-apparent disenchantment with its earlier work has undoubtedly fuelled legislative and judicial antipathy to exclusionary rules as opposed to exclusionary discretion, in England as elsewhere. Is it vain, then, to imagine that Dickerson may lead to us, once again, hearing more about due process?汉语译文:重申米兰达排除规则在20世纪60年代,马普诉俄亥俄与米兰达诉亚利桑那两个具有里程碑意义的案件中,最高法院根据美国宪法第四、第五修正案确立了自动排除规则。

民法典合同编通则司法解释的英文

民法典合同编通则司法解释的英文

民法典合同编通则司法解释的英文全文共10篇示例,供读者参考篇1The judicial interpretation of the General Provisions of the Civil Code is like a secret map that helps us understand the rules in the Civil Code Contract Law. It helps us navigate through the tricky waters of legal language and make sense of what the law says.First of all, let's talk about what a judicial interpretation is. Basically, it's like a guidebook written by judges to explain how the law should be applied in specific situations. Think of it as a cheat sheet that helps us understand what the law really means.Now, when it comes to the General Provisions of the Civil Code, the judicial interpretation gives us more details on how to interpret and apply the rules in the Contract Law. It clarifies concepts like good faith, fairness, and reasonableness, which are important principles in contract law.For example, the judicial interpretation helps us understand what it means to act in good faith when entering into a contract.It tells us that parties should be honest and fair in their dealings, and that they shouldn't try to trick or deceive each other.The interpretation also explains how to determine if a contract is reasonable or not. It tells us that a contract should be fair and balanced for both parties, and that it shouldn't put one party at a disadvantage.In conclusion, the judicial interpretation of the General Provisions of the Civil Code is like a helpful guide that shows us how to navigate the world of contract law. It helps us understand the rules and principles that govern contracts, and it ensures that justice is served in our legal system.篇2Title: My Thoughts on Civil Code Contract Section Judicial InterpretationHey guys, have you heard about the Civil Code Contract Section Judicial Interpretation? It's a really important thing that we should know about. Let me explain it to you in a simple and fun way!First of all, let's talk about what the Civil Code is. The Civil Code is like a set of rules that tells us how we should behave andtreat each other in society. It covers many things, like contracts, property rights, and family relationships.Now, let's focus on the Contract Section of the Civil Code. It talks about how people make agreements with each other, called contracts. Contracts can be about buying or selling things, renting a house, or even getting married!The Judicial Interpretation of the Contract Section is like a guidebook for judges and lawyers to understand how the law applies to different contract situations. It helps them make fair decisions and solve disputes between people.Some important things that the Judicial Interpretation covers are the formation of contracts, the rights and obligations of parties, and how to deal with contract breaches. It's like a cheat sheet that helps everyone understand the rules of the game.In conclusion, the Civil Code Contract Section Judicial Interpretation is like a big rulebook that helps us know how to play by the rules when making agreements with others. It's important for us to follow these rules so that we can live in a fair and just society.Hope you guys learned something new today! Thanks for listening!篇3Once upon a time, there was a magical book called "Civil Code - Contract section General Principles Judicial Interpretation". This book contained lots of rules and guidelines about contracts, which are like promises between people. Let me tell you all about it in English!First things first, this book talks about how contracts are made. It says that people can make contracts by talking to each other, writing things down, or even just by nodding their heads. But there are some important rules to follow, like making sure both parties agree on the terms and not tricking each other.Next, the book talks about different types of contracts. There are contracts for buying things, renting things, borrowing things, and even lending money. Each type of contract has its own rules and requirements, so it's important to pay attention to the details.Now, let's talk about what happens if someone breaks a contract. The book says that if one party doesn't do what they promised in the contract, the other party can ask forcompensation or even take them to court. But it's always best to try to work things out peacefully first.Lastly, the book explains how judges can help interpret and enforce contracts. If there's a dispute about what a contract means, a judge can look at the facts and the law to make a fair decision. It's like having a wise old storyteller to help settle arguments and make sure everyone plays by the rules.And that's the end of our story about the "Civil Code - Contract section General Principles Judicial Interpretation" book. Remember, contracts are like magical spells that bind people together, so always be honest and fair when making promises!篇4The Civil Code Contract Compilation General Provisions Judicial Interpretation was recently released, and it's super important! Let me break it down for you in simple terms, just like how we learn in primary school.First off, what's a contract? Well, it's like a promise between two parties to do something or not do something. It can be written down or just made verbally. It's kind of like when we promise our friends to share our snacks with them.The new judicial interpretation gives us rules on how contracts should be made, performed, and terminated. It also tells us what happens if one party doesn't keep their promise, like if they don't pay back borrowed money.One cool thing in the interpretation is that it says contracts should be fair and reasonable. That means both parties should get something good out of the deal, not just one. It's like when we trade our stickers with our friends - we both get stickers we like!Another important point is that contracts should follow the law. That means they can't go against the rules set by the government. So, if we make a promise to do something illegal, like taking things without permission, that contract won't be valid.In conclusion, the new judicial interpretation helps us understand how contracts work and what we should do if there's a problem. It's like our guidebook for making fair and legal deals with others. So, let's remember to always keep our promises and follow the rules!篇5Title: Let's Talk About the General Provisions of the Civil Code Contract Compilation and Judicial InterpretationHey everyone! Today, we're going to talk about something super important called the General Provisions of the Civil Code Contract Compilation and Judicial Interpretation. It might sound like a big mouthful, but don't worry - I'm here to break it down for you in simple terms.First things first, what is the Civil Code? Well, the Civil Code is a set of laws that govern our everyday lives, like buying things, renting apartments, and even getting a job. The Contract Compilation is a part of the Civil Code that specifically deals with agreements between people, called contracts. These contracts can be about anything, from buying a toy to renting a house.Now, let's talk about the General Provisions. These are like the basic rules that apply to all contracts. For example, one of the rules is that both parties have to agree to the contract freely and voluntarily. This means that nobody can force someone to sign a contract against their will. Another rule is that the contract has to be legal and follow the law. So, if you make a contract to do something illegal, like steal a bike, it won't be valid.But what happens if there's a disagreement about a contract? That's where the Judicial Interpretation comes in. This is when ajudge looks at the contract and decides what it means and how it should be enforced. They might look at things like the language used in the contract, what the parties intended when they made the agreement, and any other relevant facts.So, in a nutshell, the General Provisions of the Civil Code Contract Compilation and Judicial Interpretation are all about making sure that contracts are fair, legal, and enforceable. It's like a guidebook for how we should make agreements with each other. And remember, it's always important to read and understand a contract before you sign it. Stay smart, stay safe, and happy contracting!篇6Oh! Hi everyone! Today, I want to talk about something super cool - the General Provisions of Contracts in the Civil Code of China! It may sound a bit boring, but trust me, it's really important stuff!So, the General Provisions of Contracts are like the rules that we have to follow when we make agreements with other people. They help us understand how contracts work and what we need to do to make sure everything is fair and square.One super cool thing about the General Provisions of Contracts is that they are there to protect us and make sure that everyone sticks to their promises. For example, if we make a deal with someone and they don't keep their end of the bargain, we can use the rules in the General Provisions of Contracts to help us sort things out.Another important thing to remember is that contracts need to be fair and reasonable. That means that we shouldn't agree to anything that is unfair or goes against the law. The General Provisions of Contracts help us understand what is and isn't acceptable when it comes to making agreements.Overall, the General Provisions of Contracts are super important because they help us make sure that everyone is treated fairly and that we can trust the agreements we make with others. So next time you make a deal with someone, remember to keep these rules in mind and make sure everything is clear and fair. Bye for now!篇7Hi guys, today I'm going to talk about the judicial interpretation of the General Provisions of the Civil CodeContract Law. It's a mouthful, but don't worry, I'll break it down for you in simple terms.First of all, what is the Civil Code? It's a set of laws that govern how people interact with each other in society. The Contract Law, which is part of the Civil Code, deals with agreements between two or more parties.Now, the General Provisions of the Civil Code Contract Law, also known as the "General Principles," lay out the basic rules that apply to all contracts. They cover things like the parties involved, their rights and obligations, and how contracts are formed and terminated.But sometimes, there are disputes or questions about how these rules should be applied. That's where judicial interpretation comes in. Judges and courts can issue interpretations to clarify the meaning of the law and how it should be applied in specific cases.For example, let's say you and your friend make a contract to trade your toys. If there's a disagreement about who should get what toy, the court might issue an interpretation to clarify how the contract should be enforced.So, the judicial interpretation of the General Provisions of the Civil Code Contract Law plays a crucial role in ensuring that contracts are fair and enforceable. It helps to resolve disputes and uphold the principles of justice and equality.In conclusion, the General Provisions of the Civil Code Contract Law and its judicial interpretations are important tools for maintaining order and fairness in society. Remember, always read the fine print before signing a contract, and if there's any confusion, don't hesitate to seek legal advice. Thanks for listening, guys!篇8Once upon a time, there was a big book called the Civil Code Contract Compilation. It talked about all the rules and laws for making agreements between people. But sometimes, the rules in the book were a little confusing, so the judges had to make some special explanations to help everyone understand better.In the Contract Compilation, there are many important rules about how people can make agreements with each other. For example, it says that a contract is a promise between two or more people to do something or not do something. It also saysthat a contract can be written or just spoken out loud, as long as both sides agree to it.But what happens if someone breaks their promise in a contract? That's when the judges have to step in and make a decision. They use the rules in the Contract Compilation to help them figure out who is right and who is wrong. They also use their own common sense and fairness to make sure that everyone gets treated fairly.The judges' explanations are like little notes in the margins of the Contract Compilation. They help to explain some of the trickier rules and make things clearer for everyone. So even though the big book of laws can be a little confusing sometimes, the judges are always there to help make sure that everything is fair and just for everyone.And that's how the Contract Compilation and its special explanations help to make sure that people can make agreements with each other in a fair and honest way. It's like a big rulebook that everyone can follow to make sure that everyone is happy and treated right. So, next time you make a promise with someone, just remember to follow the rules in the Contract Compilation, and everything will be just fine!篇9Once upon a time, there was a super cool thing called the Civil Code Contract Compilation and Judicial Interpretation. These big words might sound scary, but don't worry, I'll explain it to you in a super fun and easy way!So, the Civil Code Contract Compilation basically talks about how contracts work in our country. It's like a rulebook for when people make promises to each other. For example, if you promise to give your friend a toy in exchange for some candy, that's like a contract!But sometimes, things don't go as planned and people might break their promises. That's where the Judicial Interpretation comes in. It's like a guidebook for judges to help them decide what to do when someone breaks a contract. They have to make sure that everyone is treated fairly and that the rules are followed.So, to sum it all up, the Civil Code Contract Compilation and Judicial Interpretation are like the superheroes of the legal world. They make sure that everyone plays by the rules and that promises are kept. So remember, always think before you make a promise and make sure to follow the rules!And that's the end of our super cool story about the Civil Code Contract Compilation and Judicial Interpretation. I hope you had fun and learned something new! Keep being awesome, my little legal experts! ♂️ ♂️篇10Once upon a time, there was a new law book called the Civil Code Contract Compilation. It was a super important book that helped explain all the rules about contracts in our country. But sometimes, the rules were a bit tricky to understand, so the judges had to make a special guide called the Judicial Interpretation to help everyone understand better.The Judicial Interpretation was like a cheat sheet that explained the rules in a simpler way. It talked about things like how contracts work, what happens if someone breaks a contract, and how to fix things if there's a problem. The judges worked really hard to make sure it was easy for everyone to understand, even kids like us!One cool thing about the Judicial Interpretation is that it helps make sure everyone plays fair when it comes to contracts. It has rules to protect both the people who make the contractand the people who sign it. That way, everyone knows what to expect and nobody gets tricked or cheated.So next time you have to sign a contract, remember to check out the Civil Code Contract Compilation and the Judicial Interpretation to make sure you know all the rules. And if you ever have a problem with a contract, you can always ask a grown-up for help or talk to a lawyer who knows all about contracts. Just remember, contracts are super important, so make sure you understand them before you sign on the dotted line!。

上传课文原文 A matter of sovereignty商务英语写作

上传课文原文 A matter of sovereignty商务英语写作

A matter of sovereignty: What the European Court’s ruling means for the technology industry1[1] “YOU asked for it, now live with it.” That was, in essence, the message spread by Microsoft’s lobbyists after the European Court of First Instance① upheld a landmark antitrust ruling against the world’s largest software firm on September 17th, dealing it the most stinging defeat in nearly a decade of antitrust litigation. Emboldened by this decision, Europe’s anti-monopoly squad will now go after other technology firms with high market shares, the lobbyists warn, forcing them to give up valuable intellectual property and curbing the incentive to innovate. Yet it is unlikely that Neelie Kroes②, the European Union (EU) competition commissioner, will now “be leading a prison march of the world’s most successful firms through her Brussels doors”, as one lobbyist put it. The judgment’s consequences are far-reaching, but in a different way. If it is not overturned—as The Economist went to press, Microsoft had not said whether it would make a final appeal—the firm will, in effect, lose much of its sovereignty over the virtual territory staked out by its Windows operating system.[2] Microsoft ended up in the dock in both Europe and America because it tried to protect and extend its Windows monopoly in two ways. One was by bundling other types of software along with Windows, notably its web browser, a move that triggered the antitrust action in America. Its other approach, which lay at the heart of the European case, was to withhold information from rivals that would have allowed their software to “interoperate” well with Windows over a network.[3] With a new Republican president in power, America’s competition authorities decided in 2002 not to pursue the case championed by the Clinton White House and1This text is adapted from: /iw-search/we/InfoWeb?p_product=AWNB&p_theme=aggregated5&p_action=doc&p_docid=11BD087CEF7A28D8 &p_docnum=1&p_queryname=2instead negotiated a settlement with Microsoft. This “consent decree”③, large parts of which will expire in November, amounted to little more than a slap on the wrist. It failed to administer any penalty and let Microsoft add new software elements to Windows so long as PC-makers were allowed to add rival products too. The provision regarding interoperability was also limited: the requirement to provide the necessary “communication protocols” applied only to the version of Windows that runs on individual PCs, and not the one running on the servers that dish up data on corporate networks.[4] The European Commission’s initial ruling against Microsoft in 2004 can be seen as an attempt to address these shortcomings. The commission ordered Microsoft to sell a version of Windows without its media player software, the bone of contention in Europe when it comes to bundling. It ruled that the firm had to provide information on how to interoperate with Windows servers. The commission also imposed a fine of €497m ($613m), which has since grown to €777m ($990m) because it determined that Microsoft was not fully complying with its decision.[5] The European court has now upheld these remedies. Even more importantly, it largely endorsed the commission’s legal reasoning. It argued, for instance, that withholding information that is needed for PCs and servers to work together constitutes an abuse of a dominant position if it keeps others from developing rival software for which there is potential consumer demand. In such cases, the information cannot be refused even if it is protected by intellectual-property rights, as Microsoft had argued.[6] With its ruling, the court has set a precedent that means Windows is no longer simply private property with which Microsoft can do as it pleases. And this will certainly apply to any other firm that manages to build a similarly crucial and long-lasting digital monopoly. Even today, with software increasingly delivered as a service over the internet, Windows is protected by something known as the “application barrier to entry”, meaning that so many programs run on it that rivals have a hard time getting users and software developers to switch.[7] Yet, whatever the lobbyists say, European regulators are unlikely to go after every technology firm with a big market share. There are not many similarly dominantcomputer platforms. What is more, most of the potential investigations that may follow are different in kind from the action against Microsoft. In the case of Qualcomm, for instance, competitors have complained that it is charging excessive royalties for its patents on mobile-phone technologies. In the case of Apple, commission officials have already said that they are wary of proposals to force the firm to open iTunes, its online music store, to music-players other than its iPod; a separate investigation into iTunes concerns variations in pricing between European countries, rather than technological lock-in. Even the continuing investigation of Intel is not directly comparable to the Microsoft case. The world’s biggest chipmaker, the commission charges, has used abusive tactics such as offering rebates to prevent computer-makers from using chips made by its rival, AMD.[8] For the time being, the commission can apply the precedents set by the Microsoft ruling in only one case: Google, the world’s leading web-search and online-advertising firm. Just as America’s Federal Trade Commission is now doing, the EU’s competition authorities will look closely at Google’s planned takeover of DoubleClick, another leader in online advertising. And if Google becomes a central storage vault for data such as users’ location and identity, as some fear, European regulators may one day try to compel the firm to give rivals open access to this information—rather as they have now forced Microsoft to release its communication protocols. Microsoft itself is not out of legal trouble, even if it chooses not to appeal. The commission has yet to determine whether the information the firm has supplied will really ensure interoperability. Still open, too, is the issue of how much Microsoft can charge firms that want to license its protocols. Then there is the question of whether Microsoft should be forced to license the information to makers of open-source software. The firm argues that this would be tantamount to giving away the shop, but the commission thinks it would promote competition by advancing open-source rivals to Microsoft’s products. And further investigations may yet follow into Office, Microsoft’s dominant suite of business software, and Vista, the latest version of Windows.[9] No wonder Microsoft is stoking fears that the commission plans to go on an antitrust rampage. It has prompted a political backlash that may discourage the EU from staying on the case. In America the talk is of a “new form of protectionism”. After the European court’s decision Thomas Barnett, the head of the antitrust division of theDepartment of Justice, warned that it “may have the unfortunate consequence of harming consumers by chilling innovation and discouraging competition”.[10] With this judgment Europe and America have clearly moved further apart in antitrust matters. But whether, as some fear, these differences turn into a full-blown transatlantic conflict remains to be seen.[11] After all, the administration in Washington will probably have changed several more times before the Microsoft case finally draws to a close.(Total words: 1165)Notes to the Text:①European Court of First Instance: It is a constituent court of the Court of Justice of the European Union. The Court of First Instance is made up of at least one judge from 28 Member States. European Court of First Instance deals with actions taken against the institutions of the European Union by individuals and member states. Decisions of the General Court can be appealed to the Court of Justice. After the coming into force of the Lisbon Treaty on 1 December 2009, it was known as The General Court (EGC).② Neelie Kroes: Born in 1941, Neelie Kroes joined the Commission in 2004 as the European Commissioner for Competition, and then for the digital agenda until 31 October 2014. One of her first tasks in 2004 was to oversee the sanctions against Microsoft by the European Commission, known as the European Union Microsoft competition case.③ Consent Decree: It is a settlement of a lawsuit or criminal case in which a person or company agrees to take specific actions without admitting fault or guilt for the situation that led to the lawsuit.New Words and Expressionslobbyist /ˈlɒbiɪst/ n. a person who try to influence a politician or the government and, for example, persuade them to support or oppose a change in the law(政治)说客antitrust /ˌæntiˈtrʌst/ a. [only before noun] (of laws) preventing companies or groups of companies from controlling prices unfairly反垄断的deal (sth) (to sb) v. to give cards to each player in a game of cards递给incentive /ɪnˈsentɪv/ n.something that encourages you to do sth激励;刺激;鼓励appeal /əˈpiːl/ n. a formal request to a court or to sb in authority for a judgment or adecision to be changed 上诉;申诉stake /steɪk/ v. stake (out) a/ your claim (to/for/on sth) (idiom) to say or show publicly that you think sth should be yours 公开宣布自己(对某物)的所有权;向公众表示某物应属于自己dock /dɒk/ n. the part of a court where the person who has been accused of a crime stands or sits during a trialmonopoly /məˈnɒpəli/ n. (business) the complete control of trade in particular goods or the supply of a particular service; a type of goods or a service that is controlled in this way垄断;专营服务;被垄断的商品(或服务)interoperable /ˌɪntərˈɒpərəbl/ a. (technical) (of computer systems or programs) able to exchange information(计算机系统或程序之间)可交换信息的;可兼容的interoperate v.兼容decree /dɪˈkriː/ n. a decision that is made in court(法院的)裁定;判决protocol/ˈprəʊtəkɒl/ n. (computing) a set of rules that control the way data is sent between computer[计算机](数据传递的)协议dish up v. to serve food onto plates for a meal 递上(食物),上菜contention /kənˈtɛnʃn/ n. contention (that … ) a belief or an opinion that you express, especially in an argument (尤指争论时的)看法,观点comply /kəmˈplaɪ/ v. comply (with sth) to obey a rule, an order, etc. 遵从;服从;顺从endorse /ɪnˈdɔːs/ v. to say publicly that you support a person, statement or course of action(公开的)赞同;支持;认可withhold /wɪðˈhəʊld/ a. (formal) to refuse to give sth to sb拒绝给;不给precedent /ˈpresɪdənt/ n. an official action or decision that has happened in the past and that is seen as an example or a rule to be followed in a similar situation later 可援用参考的具体例子;事例;范例royalty /ˈrɔɪəlti/ v. a sum of money that is paid to sb who has written a book, piece of music, etc. each time that it is sold or performed 版税rebate /ˈriːbeɪt/ n. an amount of money that is taken away from the cost of sth, before you pay for it 返还(退还部分货价);折扣vault /vɔːlt/ n. a room with thick walls and a strong door, especially in a bank, used for keeping valuable things safe (尤指银行的)金库;保险库tantamount /ˈtæntəmaʊnt/ v. tantamount to sth (formal) having the same bad effect as sth else 无异于;等于;效果与…一样坏stoke /stəʊk/ v. to cause something to increase 煽动;添加rampage /ˈræmpeɪdʒ/ n. a sudden period of wild and violent behavior, often causing damage and destruction 横冲直撞;狂暴行为backlash/ˈbæklæʃ/ n.a strong negative reaction by a large number of people, forexample to sth that has recently changed in society(对社会变动等的)强烈抵制;集体反对chill /tʃɪl/ n. to frighten sb. 使恐惧;恐吓;吓唬full-blown a. having all the characteristics of sb/sth; fully developed具所有特征的;成熟的。

【词汇学习】方位谜团:脱离到从属

【词汇学习】方位谜团:脱离到从属

1.This is a company with explicit and strict regulations and no one can be ____.Auploaded Bdownloaded Coff limits Dmade of答案解析 正确答案:C解析:句子翻译为:这是一家有着明确而严格的规章制度的公司,没有人能____。

A. 上传,B. 下载,C. 限制/限度之外,D. 由…组成,由…构成,只有C 符合题意 2. All the English teams were _____ in the early stages of the competition.Aon the account ofBmade from Cmade of Deliminated 答案解析正确答案:D解析:句子翻译为:所有的英格兰队在比赛的初期都_____。

A. 因为,基于,B. 由…制成的【过程更加复杂】,C. 由…组成,由…构成,D. 排除在外,排斥(此处为淘汰),只有D 符合题意 3. The judge also noted that evidence showed Gupta made his phone calls to Rajaratnam only seconds after getting ______ conference calls.Aoff courseBon-again, off-again Coff board Doff key 答案解析正确答案:C解析:句子翻译为:法官还注意到有证据表明Gupta 在接到____会议电话后几秒钟就给拉贾拉特南打了电话。

A. 逾矩、逾规,B.时有时无,若即若离,C. 场外交易,D. 走调的,不合拍的,只有C 符合题意 4. _____ —— different from what most people expect.AOffbeatBOff center COff chance DOff load 答案解析正确答案:A解析:句子翻译为:_____——与大多人预料的不同。

法律效力 英文

法律效力 英文

法律效力英文The Legal Force of a LawIntroductionThe legal force of a law refers to its ability to enforce regulations and govern society. It is an essential element that establishes the rule of law and ensures social order. In this essay, I will discuss the factors that contribute to the legal force of a law, its importance to society, and the consequences of disregarding it.Factors contributing to the legal forceSeveral factors contribute to the legal force of a law. First and foremost, laws require a legitimate authority to establish their legality. This authority can be in the form of a legislative body, such as a parliament, which passes laws binding on the citizens. In democratic societies, laws are usually enacted through a transparent and accountable process, thereby providing them with greater legitimacy.Another critical factor contributing to the legal force is the enforceability of a law. Laws must be backed by a competent and impartial judiciary that can interpret and apply them. The existence of a functioning judicial system ensures that those who violate the law can be held accountable through legal proceedings. Without enforceability, laws would lose their significance and fail to effectively regulate society.The importance of legal force to societyThe legal force of a law is of utmost importance to society. It serves as a tool for maintaining order, protecting individual rights, and promoting justice. Laws establish boundaries and provide guidelines for acceptable behavior, preventing chaos and anarchy. They also define and protect fundamental human rights, such as the right to life, liberty, and property.Moreover, the legal force of a law ensures equal treatment for all members of society. It prevents discrimination and promotes equality before the law. By setting out clear rules and procedures, laws ensure that every individual is subject to the same legal framework, regardless of their social status, race, gender, or wealth.Consequences of disregarding the legal forceDisregarding the legal force of a law can have severe consequences for both individuals and society. Firstly, it undermines the rule of law, which is a fundamental pillar of any democratic society. Without the rule of law, societies devolve into chaos, as there is no mechanism to regulate behavior and ensure justice.Secondly, disregarding the legal force can lead to breaches of individual rights. When individuals act outside the bounds of the law, they infringe upon the rights of others and create an environment of fear and insecurity.Additionally, the disregard of the law can erode trust in institutions and undermine the legitimacy of the legal system. If people believe that they can act with impunity, they may lose faith in the ability ofthe legal system to deliver justice. This lack of trust can undermine social cohesion and hinder the development of a fair and just society.ConclusionIn conclusion, the legal force of a law is crucial for establishing the rule of law, defining boundaries, and ensuring justice. Factors such as legitimate authority and enforceability contribute to its effectiveness. Disregarding the legal force can have detrimental consequences for society, including a breakdown of order, violations of individual rights, and a loss of trust. Therefore, it is essential to uphold the legal force of laws and promote a system that respects and enforces them.。

高考英语真题试卷改编

高考英语真题试卷改编

Part I Listening Comprehension (25 points)Section AIn this section, you will hear 5 short conversations. At the end of each conversation, a question will be asked about what was said. Both the conversation and the question will be spoken only once. After each question there will be a pause. During the pause, you must read the four choices marked A), B), C) and D), and decide which is the best answer. Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.1. A) The man is not sure what to do. B) The man needs to buy a new bike.C) The woman suggests the man go for a ride. D) The woman doesn't like the man's bike.2. A) The man will help the woman with the laundry. B) The woman should do the laundry herself. C) The man is not willing to help. D) The woman should wait until the man is free.3. A) The woman has never seen the movie. B) The woman didn't like the movie. C) The woman didn't understand the movie. D) The woman enjoyedthe movie.4. A) The man is taking a train to New York. B) The woman is visitingthe man in New York. C) The man is planning a trip to New York. D) The woman is suggesting a trip to New York.5. A) The woman will meet the man at the airport. B) The man will drive the woman to the airport. C) The woman should take a taxi to the airport.D) The man is going to the airport himself.Section BIn this section, you will hear 2 long conversations. At the end of each conversation, there will be some questions. Both the conversation andthe questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A), B), C) and D). Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Conversation 16. A) They are discussing a new book. B) They are planning a vacation. C) They are comparing their study habits. D) They are talking about a class project.7. A) She prefers to study alone. B) She finds group study more effective. C) She always studies with her friends. D) She doesn't liketo study at all.8. A) They will exchange notes. B) They will share the book. C) Theywill discuss the book in class. D) They will skip the book.Conversation 29. A) They are discussing a new restaurant. B) They are planning a meal together. C) They are arguing about the best cuisine. D) They are comparing their favorite dishes.10. A) The man will try the sushi. B) The woman will order the pizza. C) They will split the bill. D) They will share the dessert.Part II Vocabulary (20 points)There are 10 incomplete sentences in this section. For each sentence there are four choices marked A), B), C) and D). Choose the one thatbest completes the sentence. Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.11. The company is facing a(n) ________ in the market due to the new competition.A) crisis B) failure C) challenge D) decline12. She was so ________ that she didn't notice the time passing.A) absorbed B) bored C) amused D) interested13. The teacher ________ the students for their excellent performance in the competition.A) praised B) criticized C) ignored D) scolded14. The museum has a(n) ________ collection of ancient artifacts.A) vast B) diverse C) rare D) fascinating15. He has a(n) ________ for music and can play several instruments.A) passion B) talent C) skill D) interest16. The government has introduced new measures to ________ pollution in the city.A) reduce B) increase C) control D) prevent17. She felt a ________ of anxiety as she prepared for her final exam.A) wave B) flood C) surge D) rush18. The team captain showed great ________ during the game, leading his teammates to victory.A) courage B) confidence C) strength D) energy19. The book provides a ________ of information on the history of the city.A) summary B) collection C) variety D) range20. The company's ________ was to become the leading provider of technology solutions.A) mission B) goal C) purpose D) objectivePart III Reading Comprehension (40 points)Section AFor each passage, there are five questions or incomplete statements. For each question or statement, there are four choices marked A), B), C) and D). You should decide on the best choice and mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Passage 1Questions 21-25 are based on the following passage.In recent years, there has been a growing concern about the impact of social media on young people. Many experts argue that excessive use of social media can lead to negative psychological effects, such as anxiety, depression, and low self-esteem. However, others believe that social media can also have positive effects, such as fostering social connections and providing a platform for self-expression.21. What is the main topic of the passage?A) The advantages of social media. B) The negative effects of social media. C) The mixed effects of social media. D) The use of social media by young people.22. According to the passage, what is the main concern about social media?A) It can lead to physical health problems. B) It can causepsychological issues. C) It can limit social interactions. D) It can bea distraction from schoolwork.23. What is the author's stance on the topic?A) The author is against the use of social media. B) The author isneutral about the topic. C) The author supports the use of social media.D) The author believes social media is harmless.24. Which of the following is NOT mentioned as a positive effect ofsocial media?A) Fostering social connections. B) Providing a platform for self-expression. C) Enhancing communication skills. D) Increasing creativity.25. What can be inferred from the passage?A) Social media should be banned for young people. B) Social media hasno impact on young people. C) Social media has both positive andnegative effects. D) Social media is the main cause of mental health issues among young people.Section BQuestions 26-30 are based on the following passage.The world of technology is advancing at a rapid pace, and with it comes a new wave of innovations. One of the most significant advancements isin the field of artificial intelligence (AI). AI has the potential to revolutionize various industries, from healthcare to transportation. However, there are also concerns about the ethical implications of AI, particularly in terms of privacy and job displacement.26. What is the main topic of the passage?A) The advancements in technology. B) The ethical implications of AI. C) The impact of AI on different industries. D) The concerns about the future of AI.27. What is one potential benefit of AI mentioned in the passage?A) Improved healthcare outcomes. B) Increased job opportunities. C) Enhanced transportation systems. D) Better communication between people.28. According to the passage, what is one of the main concerns regarding AI?A) It could harm the environment. B) It could lead to job losses. C) It could compromise privacy. D) It could cause global conflicts.29. Which of the following is NOT mentioned as an ethical issue related to AI?A) Privacy concerns. B) Bias in AI algorithms. C) The potential for AI to cause harm. D) The use of AI in military applications.30. What can be inferred from the passage about the future of AI?A) AI will eventually replace all human jobs. B) AI will be widely adopted in various industries. C) AI will become a major source of conflict. D) AI will be completely banned due to ethical concerns.Part IV Writing (25 points)Write an essay of about 150-200 words on the following topic:In recent years, online learning has become increasingly popular. Some people believe it offers many advantages, such as convenience and flexibility. Others, however, argue that traditional classroom learning is still the best way to acquire knowledge. Which do you think is more beneficial? Give reasons and details to support your answer.Write your essay on Answer Sheet 2.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A MATTER OF INTERPRETATION: FEDERAL COURTS AND THE LAWBY ANTONIN SCALIAPrinceton University Press (1997)1)In law school law students cut their teeth on common law courses2)Common law courts performed two primary functions: A) they applied the law tothe facts; and B) they made law. [Or, one might say “In the accumulation ofthose applications of the law to the facts, new law was made.”3)Common law follows the principle of stare decisis – the principle that a decisionmade in one case will be followed in the next.4)Stare decisis requires that one acquire the skill of distinguishing cases – does acase at hand fall within a principle that has already been decided?5)One looks for the principle or principles in the holdings of cases, and identifyingwhat is the holding of a case is an art form.6)The common law grows then much like a scrabble boardAll of the above would be well and good, except for a trend in governments which we call democracy. In our democracy we adhere generally to a separation of powers between the executive, legislative, and judicial branches of government.1)Unelected judges and to some extent elected judges creating law in the manner ofthe common law process is undemocratic. [The law codification movement of the 19th century was a reaction to this. Consider the American Law Institute todaythat hires a couple of “Reporters” to take the common law, say in torts, contracts, or trusts or wills, and spruce it up – codify it, make improvements, make it moreformal, cohesive, with examples, and modernize it – and then put it out there forstate legislatures to use or to adopt into statutory law or to adopt as part of their common law. When a legislature adopts a Restatement of the Law then, of course, it goes through a legislative process, with the opportunity for modifications etc.and then becomes statutory law]2)Today, private-law fields – contracts, torts, property, trusts and estates, family law– remain firmly in the control of state common-law courts. [this seemsexaggerated to me since there are many key statutes that play major roles in these fields]3)But, today private law is turning statutory – Congress and the state legislaturesand administrative agencies produce many of the statutes and rules that govern the people.4)On the Supreme Court Scalia estimates that less than a fifth of the issues theCourt decides are constitutional law cases, and if you take away criminal cases, then probably more like one-twentieth of all cases the Supreme Court decides are constitutional law cases.Consequently the subject of statutory interpretation deserves study as the principal business of judges and lawyers.1)There are few treatises and a lack of other materials on the subject of statutoryinterpretation.2)Legislative intent is often referred to as a source of the meaning of a statute andits interpretation.3)The problems with legislative intent are many: A) the text is primary, and goingbehind it is a very dangerous and undemocratic thing to do; B) If you look for legislative intent in comments and records of the legislative body, you will be looking at what some committee said well before the legislation was ever voted on, and the committee may be a very small part of the legislature, and their intent may changed several times between the time their comments are recorded and the time that the legislation is passed; C) your best shot at figuring out what thelegislature meant may be to ask yourself what the legislation should have meant to a wise and intelligent person – but, then the answer you will get is the most wise and intelligent answer that you can give, and consequently the statute comes to mean what you think that it ought to mean. The same way that judges decide common l aw. But, the common law method is undemocratic. “I reject intent of the legislature as the proper criterion of the law.”4)In Church of the Holy trinity v. United States (1892) Congress had enacted astatute that made it unlawful for any person to “in any way assist or encourage the importation or migration of any alien into the U.S. under contract or agreement made previous to the importation or migration of such alien to perform labor or service of any kind in the United States.” The Holy Church contract ed with an English clergyman to come to New York to be its pastor. The Circuit Court for the Southern District of NY held that the church violated the statute and ordered the church to pay the statutory fine. The U.S. Supreme Court reversed the lower co urt and held: “…we cannot think Congress intended to denounce with penaltiesa transaction like that in the present case. It is a familiar rule, that a thing may bewithin the letter of the statute and yet not within the statute, because not within its s pirit, now within the intention of its makers.”5)Congress can write foolish or wise statutes. It is not for the Supreme Court todecide which is which and rewrite the ones deemed foolish.6)This entire practice in 99.99% of the cases in looking for legislative intent shouldbe abandoned. It is not compatible with democratic theory.7)The text is the law, and it is the text that must be observed.“Textualism should not be confused with so-called strict constructionism, a degraded form of textualism that brings the whole philosophy into disrepute. I am not a strict constructionist, and no one out to be…” (p. 23)1)”A text should not be construed strictly, and it should not be construed leniently;it should be construed reasonably, to contain all that it fairly m eans.” (p. 23)2)“Words do have a limited range of meaning, and no interpretation that goesbeyond that range is permissible.” (p. 23)3)The Due Process Clause. It guarantees only process. Property can be taken;liberty can be taken; and life can be taken, but not without the process that our traditions require - a validly enacted law and a fair hearing.4) A criticism of textualism is that it is formalistic. “The answer to that is, of courseit’s formalistic! The rule of law is about form.” (p. 25)5)Long live formalism. It is what makes a government a government of laws andnot of men.6)Cannons of interpretation and presumptions and rules of construction are of littlehelp, and are often a great hindrance.7)It is hard enough to provide a uniform, objective answer to the question as towhether a statute means one thing or another, but “it is virtually impossible to expect uniformity and objectivity when there is added, on one or the other side of the balance, a thumb of indeterminate weight.”8)“The rule that st atutes in derogation of the common law will be narrowlyconstrued seems like a sheer judicial power-grab.”INTERPRETING CONSTITUTIONAL TEXTS1)“In textual interpretation, context is everything” – words and phrases shouldbe given an expansive rather than a narrow interpretation, but not aninterpretation that the language will not bear. (p. 38)2)He rejects looking to the “drafter’s intent” in both statutory interpretation andin Constitutional interpretation.3)He will consult the writings of those who were delegates to the ConstitutionalConvention because their writings display how the text of the Constitutionwas originally understood. He gives equal weight to Jefferson’s or Jay’swritings even though neither was a framer. (Jefferson was in France).4)“What I look for in the Constitution is precisely what I look for in a statute:the original meaning of the text, not what the original draftsmen intended.” (p.38).5)Scalia looks for original meaning not current meaning. He rejects the methodof those who believe that the Constitution is a body of law that grows and changes from age to age in order to meet the needs of a changing society.This is the common law view of Constitutional law – where the judgesdetermine what the needs are and then “find” that chang ing law. (p. 38)6)Should there be a Constitutional right to die. If so, then some judges will findone. Should there be a constitutional right to reclaim a biological child put out for adoption by the other parent? “Again, if so, there is.” “If it is goo d, it is so.”7)Never mind the text. “We will smuggle these new rights in, if all else fails,under the Due Process Clause.”8)“A society that adopts a bill or rights is skeptical that “evolving standards ofdecency” always “mark progress,” and that societies always “mature,” asopposed to rot. (p. 40)FLEXIBILITY AND LIBERALITY OF THE LIVING CONSTITUTION1)“The argument most frequently made in favor of The Living Constitutionis a pragmatic one: such an evolutionary approach is necessary in order to provide t he “flexibility” that a changing society requires…” (p. 41)2)But instead of eliminating restrictions on democratic government (readmajoritarianism) the “evolving” Constitution has imposed a vast array ofnew constraints on legislative, administrative and judicial action.3)And the future agenda of these constitutional evolutionists is the creationof new restrictions on democratic government. Instead of eliminating old constraints they create new ones.4)And the proponents of the “evolving” Constitution belie ve that theevolution will always be in the direction of greater personal liberty. “They consider that a great advantage, for reasons that I do not entirelyunderstand. All government represents a balance between individualfreedom and social order, and it is not true that every alteration of thatbalance in the direction of greater individual freedom is necessarily good.”(p. 423)5)The proponents of the Living constitution do not follow the desires of theAmerican people in determining how the Constitution should evolve, they follow nothing so precise; indeed as a group they follow nothing at all. 6)“As soon as the discussion goes beyond the issue of whether theconstitution is static, the evolutionists divide into as many camps as there are individual views of the good, the true, and the beautiful.” (p. 45)7)“For the evolutionist… every question is an open question, every day anew day.”8)“If the courts are free to write the Constitution anew, they will, by God,write it the way the majority wants; the appointment and confirmationprocess will see to that. This, of course, is the end of the Bill of Rights, whose meaning will be committed to the very body it was meant to protect against; the majority.” (p. 47)。

相关文档
最新文档