ImageVerifierCode 换一换
格式:DOC , 页数:37 ,大小:133KB ,
资源ID:480598      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-480598.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([外语类试卷]大学英语六级模拟试卷37及答案与解析.doc)为本站会员(hopesteam270)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[外语类试卷]大学英语六级模拟试卷37及答案与解析.doc

1、大学英语六级模拟试卷 37及答案与解析 一、 Part I Writing (30 minutes) 1 For this part, you are allowed 30 minutes to write a poster inviting freshmen to join a student association. You should write at least 150 words following the outline given below in Chinese: 1. 协会正在招募新成员 2. 协会的历史、宗旨和开展的活动 3. 如何加入,联系方式 二、 Part II R

2、eading Comprehension (Skimming and Scanning) (15 minutes) Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions attached to the passage. For questions 1-4, mark: Y (for YES) if the statement agrees with the information given in the passage; N (for

3、 NO) if the statement contradicts the information given in the passage; NG (for NOT GIVEN) if the information is not given in the passage. 2 Bluetooth When you use computers, entertainment systems or telephones, the various pieces and parts of the systems make up a community of electronic devices. T

4、hese devices communicate with each other using a variety of wires, cables, radio signals and infrared light(红外线 ) beams, and an even greater variety of connectors and plugs. The art of connecting things is becoming more and more complex every day. And Bluetooth has now become a new popular method of

5、 connecting devices that can streamline the process. A Bluetooth connection is wireless and automatic, and it takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. Bluetooth Operation Bluetooth net

6、working transmits data via 10w-power radio waves. It communicates on a frequency of 2.45 gigahertz(千兆赫 )(actually between 2.402 GHz and 2.480 GHz, to be exact). This frequency band has been set aside by international agreement for the use of industrial, scientific and medical devices(ISM). A number

7、of devices that you may already use fake advantage of this same radio-frequency band. Baby monitors(微型监视器 ), garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. One of the ways Bluetooth devices avoid interfering with other systems is by send

8、ing out very weak signals of about 1 milliwatt. By comparison, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters(32 feet), cutting the chances of interference between your computer system and your portable telephon

9、e or television. Even with the low power, Bluetooth doesnt require line of sight between communicating devices. The Walls in your house wont stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms. Bluetooth can connect up to eight devices simultaneousl

10、y. With all of those devices in the same 10-meter(32-foot) radius; you might think theyd interfere with one another, but its unlikely. Bluetooth uses a technique called spread-spectrum.(扩展频谱 ) frequency that makes it rare for more than one device to be transmitting on the same frequency at the same

11、time. In this technique, a device will use. 79 individual, randomly chosen frequencies within a designated range, changing from one-to another on a regular basis. In the case of Bluetooth. the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a

12、limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, its unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetoo

13、th devices, since any interference on a particular frequency will last only a tiny fraction of a second. Piconets(个人域网络 ) Lets say you have a typical modern living room with the typical modern Stuff inside. Theres an entertainment system with a stereo, a DVD player, a satellite TV receiver and a tel

14、evision; theres also a cordless telephone and a-personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral(外围设备 ). The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer h

15、as programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in th

16、e range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since its not from within the network. The computer and entertainment system go through similar routines, establishing networks among addresses in rang

17、es established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the pieonets are completely separated from one another. Now the living room has three separate networks established,

18、 each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to. Since each network is changing the frequency of its operation thousands of times a second, its unlikely that any two networks will be on the same frequency at the sa

19、me time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with the networks business. Bluetooth Security In any wireless networking setup, security

20、 is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals arent intercepted. Bluetooth technology is no different its wireless and therefore susceptible to spying and remo

21、te access, just like WiFi is susceptible if the network isnt secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission. Bluetooth offers several security mo

22、des, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget(配件 ). In almost all cases, Bluetooth users can establish “trusted devices“ that can exchange data without asking permission. When any other device tries to establish a connection to the users gadget, the user

23、 has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and requir

24、e that users make a conscious decision to open a file or accept a, data transfer. As long as these measures are enabled on the users phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to “non-discoverable“ and avoid connecting with other Bluetoot

25、h devices entirely. If a user makes use of the Bluetooth network primarily for synching devices at home, this might be a good way to avoid any chance of a security breach while in public. Still, early cell-phone virus writers have taken advantage of Bluetooths automated connection process to send ou

26、t infected-files. However, since most cell phones use a secure Bluetooth connection that requires authorization and authentication before accepting data from an unknown device, the infected file typically doesnt get very far. Other problems like “bluejacking“, “bluebugging“ and “Car Whisperer“ have

27、turned up as Bluetooth-specific security issues. Like a computer security hole, these vulnerabilities are an inevitable result of technological innovation, and device manufacturers are releasing firmware upgrades that address new problems as they arise. 2 Bluetooth is changing small-area networking

28、into a wireless and automatic connection with no need for user intervention and low need of transmission power. ( A) Y ( B) N ( C) NG 3 Bluetooth networking transmits data via low-power radio waves between 2.402 GHz and 2.480 GHz. ( A) Y ( B) N ( C) NG 4 Making sure that Bluetooth and its connected

29、devices dont interfere with one another can be difficult. ( A) Y ( B) N ( C) NG 5 With the development of spread-spectrum technique, we may use Bluetooth connection as a substitute for cell phone. ( A) Y ( B) N ( C) NG 6 Any two networks in piconets is unlikely to be on the same frequency simultaneo

30、usly because each network is changing its_ thousands of times a second. 7 Manufacturers have developed_ to correct errors like receiving signal of the same frequency from a strange device. 8 Security is also a big concern as Bluetooth technology has an essence of_. 9 People can send you data without

31、 your permission because the Bluetooth connection is_. 10 One security mode offered by Bluetooth is that data may be exchanged freely among the devices Bluetooth users establish as_. 11 Vulnerabilities of Bluetooth like “bluejacking“ are_ in the development of technology. Section A Directions: In th

32、is section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation, one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will be a pause. During the pause, you must

33、read the four choices marked A, B, C and D, and decide which is the best answer. ( A) The woman may take the next train as well. ( B) The woman has been late for the train for one hour. ( C) Someone gave the wrong information to the woman. ( D) The woman should wait patiently until he got a schedule

34、. ( A) The woman will put off her decision to study. ( B) The woman will now just study rather than go out. ( C) The woman will go out because shes in a good mood. ( D) The woman will have to make a decision whether to study. ( A) The movie was really wonderful. ( B) The movie was so full of violent

35、 scenes. ( C) The movie wasnt as good as he had expected. ( D) The movie was overly concerned with romantic relationships. ( A) Deliver the package in person. ( B) Pick up the package at the post office. ( C) Find out the hours the post office is open. ( D) Ask to have the package delivered to his h

36、ome. ( A) He wont vote for the woman. ( B) He may also run for class president. ( C) He should promise to support the woman. ( D) The woman should ask his roommate to vote for her. ( A) Shes not a very good cook. ( B) Shes annoyed with the man. ( C) She didnt like the food the man prepared. ( D) She

37、 thinks the man should spend more time cooking. ( A) Hell probably talk about Chapter 16 in class today. ( B) Hell probably postpone the test until he talks Chapter 16. ( C) He might test the students on material not discussed in class. ( D) He usually tells the students ahead of time what will be o

38、n his tests. ( A) The boss was very considerate to his workers. ( B) Ed wasnt as good a worker as the boss thought. ( C) The boss had planned to give Ed a raise in salary. ( D) The boss has never considered raising the workers salary. ( A) Studying for a test. ( B) Visiting a close fiend of theirs.

39、( C) A class presentation theyre preparing. ( D) A television program the man is watching. ( A) He thought she preferred to study alone. ( B) He thought she had made arrangements to study with. ( C) He had told her that he had done poorly on a recent test. ( D) He didnt know that she was enrolled in

40、 a linear algebra course. ( A) He and Elizabeth argued recently. ( B) Hed rather study in his own dormitory. ( C) He heard Elizabeth did poorly on the last test. ( D) He doesnt want to bother Elizabeth so late in the evening. ( A) There was a traffic accident. ( B) A car was smashed by a falling obj

41、ect. ( C) A car hit someone near the high building. ( D) A driver was killed in his new car. ( A) The woman never reads newspaper. ( B) The man is always proud of his car. ( C) The woman had her new car damaged. ( D) The man had his old car insured. ( A) He had his car hit by a failing piece of conc

42、rete. ( B) He was fined for speeding in South Street. ( C) He had been unable to park his specially-made car. ( D) He could not claim anything from the insurance company. ( A) He was annoyed. ( B) He was pleased. ( C) He felt it could be replaced. ( D) He did not care. Section B Directions: In this

43、section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A, B, C and D. ( A) Nineteenth-century sea captains.

44、 ( B) The development of the steamship. ( C) The economic importance of sailing ships. ( D) Employment in the fishing and whaling industries. ( A) They were protected by a strong United States Navy. ( B) They were supported by a well-developed railroad. ( C) Most crew members had experience on forei

45、gn ships. ( D) As part owners of the ships, captains got some of the profits. ( A) They carried passengers, but not cargo. ( B) They were large, but surprisingly fast. ( C) They were the first successful steam-powered ships. ( D) They were more reliable than other ships of the 1860s. ( A) The effect

46、 of ordinary aspects of life on anthropology. ( B) A good source of information about a society. ( C) Attitudes toward culture in the 1940s. ( D) The relationship between anthropology and military. ( A) Students might not consider them to be an important part of culture. ( B) They symbolize the rebe

47、llion of youth in the 1950s. ( C) They are discussed in the students textbook. ( D) They have been worn for hundreds of years. ( A) To show how politics have changed over the years. ( B) To point out that T-shirts often provide personal information. ( C) To illustrate how the printing on clothing ha

48、s improved. ( D) To support that T-shirts are a form of art. ( A) How the President proposes new laws. ( B) How a bill is passed by lawmakers in Congress. ( C) How the President can reject a proposed law. ( D) How lawmakers can force the President to sign a bill. ( A) Why the President opposes a bil

49、l. ( B) How lawmakers want to revise a bill. ( C) Why a deadline has not been met. ( D) When lawmakers plan to end their session. ( A) They send the message to the President within ten days. ( B) They officially state reasons for rejecting the message. ( C) They meet with the President. ( D) They revise the vetoed bill. ( A) The bill becomes law immediately. ( B) The bill cant become law unless the whole process begins again. ( C) Lawmakers must review the bill within ten days. ( D)

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1