{"dcterms:modified":"2020-01-05","dcterms:creator":"A Dataverse Instance","@type":"ore:ResourceMap","@id":"http://opendata.cqjj8.com/api/datasets/export?exporter=OAI_ORE&persistentId=doi:10.18170/DVN/EO353E","ore:describes":{"citation_zh:标题":"军事理论2018年秋期末","citation:Title":"Military Theory","citation_zh:副标题":"2018年秋期末","citation_zh:作者":{"author_zh:名称":"武装部","author_zh:所在机构":"亚洲成人在线一二三四五六区"},"citation:Author":{"author:Name":"abc"},"citation_zh:贡献者":{"contributor_zh:贡献类型":"数据采集者(Data collector)"},"citation_zh:联系人":{"datasetContact_zh:电子邮件":"lupku@qq.com"},"citation:Contact":{"datasetContact:E-mail":"lupku@qq.com"},"citation:Deposit Date":"2020-01-05","citation_zh:提交日期":"2020-01-05","citation_zh:描述":{"dsDescription_zh:文本":"一、判断题(每题1分,共10分)\r\n1. 孙武“兵者,国家之大事也”中的“兵”指兵卒。\r\n2. 我国的国防教育日是9月18日。\r\n3. 我国的国防属于中立型国防。\r\n4. 中国武装警察部队属于国务院编制序列,受中央军委领导。\r\n5. 中国海军的诞生日期是1949年4月23日。\r\n6. 早期核辐射是核爆炸最初几十分钟内从火球中放出的丙种射线和中子流。\r\n7. 遏制战略产生于1946年。\r\n8. 一般认为命中概率超过60%才能称为精确制导武器。\r\n9. 非传统安全威胁是除军事、政治和外交冲突以外的,其他对主权国家及人类整体生存与发展构成威胁的因素。\r\n10.信息化战争的主要特征是电子信息对抗和精确打击。\r\n二、简答题(每题5分,共45分)\r\n1. 中国人民解放军的使命是什么?\r\n2. 简述孙武的战争观。\r\n3. 如何理解和把握强军目标的内涵?\r\n4. 毛泽东灵活用兵的五项基本原则是什么?\r\n5. 核武器的杀伤破坏因素有哪些?\r\n6. 美国军事战略重心发生过怎样的变化?\r\n7. 什么是信息化战争?\r\n8. 制定《反分裂国家法》有何重大意义?\r\n9. 简述2018年北京市主要征兵优待政策(含北大政策)\r\n三、论述题(每题15分,共45分,每题至少300字)\r\n 1.党的十九大报告指出:当前,国内外形势正在发生深刻复杂变化,我国发展仍处于重要战略机遇期,前景十分光明,挑战也十分严峻。请结合军事理论课的知识,论述你对“我国国防挑战十分严峻”的理解。\r\n 2.谈谈对美国亚太再平衡战略的认识。\r\n 3.为什么强国必须强军?","dsDescription_zh:日期":"2020-06-20"},"citation:Description":{"dsDescription:Text":"I. Judgement questions (1 point for each question, a total of 10 points)\r\n1. The \"Bing\" in Sun Wu's \"Bingers, National Events\" also means soldiers.\r\n2. National Defense Education Day in China is September 18.\r\n3. China's national defense is neutral.\r\n4. The Chinese Armed Police Force belongs to the State Council and is under the leadership of the Central Military Commission.\r\n5. The birth date of the Chinese Navy was April 23, 1949.\r\n6. Early nuclear radiation was the radiation of gamma rays and neutrons emitted from the fireball within the first few minutes of a nuclear explosion.\r\n7. The containment strategy was born in 1946.\r\n8. It is generally believed that a hit probability of more than 60% is considered a precision guided weapon.\r\n9. Non-traditional security threats are factors other than military, political and diplomatic conflicts that pose a threat to the survival and development of sovereign states and humanity as a whole.\r\n10. The main characteristics of information warfare are electronic information confrontation and precise strike.\r\nSecond, short answer questions (5 points each, a total of 45 points)\r\n1. What is the mission of the Chinese People's Liberation Army?\r\n2. Briefly describe Sun Wu's outlook on war.\r\n3. How to understand and grasp the connotation of the goal of a strong army?\r\n4. What are the five basic principles of Mao Zedong's flexible use of troops?\r\n5. What are the destructive factors of nuclear weapons?\r\n6. How has the focus of US military strategy changed?\r\n7. What is information war?\r\n8. What is the significance of enacting the Anti-Secession Law?\r\n9. Brief description of Beijing's main military recruitment and preferential policies in 2018\r\nDiscussion questions (15 points for each question, a total of 45 points, at least 300 words per question)\r\n    1. The report of the Nineteenth National Congress of the Communist Party of China pointed out: At present, the situation at home and abroad is undergoing profound and complex changes, and China's development is still in a period of important strategic opportunities. Please combine your knowledge of the military theory class to describe your understanding of \"the challenge of China's national defense is very severe.\"\r\n    2. Talk about your understanding of the US Asia-Pacific rebalancing strategy.\r\n    3. Why do powerful nations have to be strong?"},"citation_zh:学科":"社会科学","citation:Subject":"Social Sciences","citation_zh:关键词":[{"keyword_zh:词项":"军理"},{"keyword_zh:词项":"期末"}],"@id":"doi:10.18170/DVN/EO353E","@type":["ore:Aggregation","schema:Dataset"],"schema:version":"1.0","schema:datePublished":"2020-01-05","schema:name":"Military Theory","schema:dateModified":"2020-01-05 18:29:18.812","dvcore:termsOfUse":"1.不可用于商业行为。禁止买卖\r\n2.尊重教师和同学的知识产权","dvcore:fileTermsOfAccess":{"dvcore:fileRequestAccess":false},"schema:includedInDataCatalog":"Military Theory","ore:aggregates":[],"schema:hasPart":[]},"@context":{"author":"http://opendata.cqjj8.com/schema/citation/author#","author_zh":"http://opendata.cqjj8.com/schema/citation_zh/author_zh#","citation":"http://opendata.cqjj8.com/schema/citation#","citation_zh":"http://opendata.cqjj8.com/schema/citation_zh#","contributor_zh":"http://opendata.cqjj8.com/schema/citation_zh/contributor_zh#","datasetContact":"http://opendata.cqjj8.com/schema/citation/datasetContact#","datasetContact_zh":"http://opendata.cqjj8.com/schema/citation_zh/datasetContact_zh#","dcterms":"http://purl.org/dc/terms/","dsDescription":"http://opendata.cqjj8.com/schema/citation/dsDescription#","dsDescription_zh":"http://opendata.cqjj8.com/schema/citation_zh/dsDescription_zh#","dvcore":"http://dataverse.org/schema/core#","keyword_zh":"http://opendata.cqjj8.com/schema/citation_zh/keyword_zh#","ore":"http://www.openarchives.org/ore/terms/","schema":"http://schema.org/"}}