1、大学英语六级模拟试卷 37及答案与解析 一、 Part I Writing (30 minutes) 1 For this part, you are allowed 30 minutes to write a poster inviting freshmen to join a student association. You should write at least 150 words following the outline given below in Chinese: 1. 协会正在招募新成员 2. 协会的历史、宗旨和开展的活动 3. 如何加入,联系方式 二、 Part II R
2、eading Comprehension (Skimming and Scanning) (15 minutes) Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions attached to the passage. For questions 1-4, mark: Y (for YES) if the statement agrees with the information given in the passage; N (for
3、 NO) if the statement contradicts the information given in the passage; NG (for NOT GIVEN) if the information is not given in the passage. 2 Bluetooth When you use computers, entertainment systems or telephones, the various pieces and parts of the systems make up a community of electronic devices. T
4、hese devices communicate with each other using a variety of wires, cables, radio signals and infrared light(红外线 ) beams, and an even greater variety of connectors and plugs. The art of connecting things is becoming more and more complex every day. And Bluetooth has now become a new popular method of
5、 connecting devices that can streamline the process. A Bluetooth connection is wireless and automatic, and it takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. Bluetooth Operation Bluetooth net
6、working transmits data via 10w-power radio waves. It communicates on a frequency of 2.45 gigahertz(千兆赫 )(actually between 2.402 GHz and 2.480 GHz, to be exact). This frequency band has been set aside by international agreement for the use of industrial, scientific and medical devices(ISM). A number
7、of devices that you may already use fake advantage of this same radio-frequency band. Baby monitors(微型监视器 ), garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. One of the ways Bluetooth devices avoid interfering with other systems is by send
8、ing out very weak signals of about 1 milliwatt. By comparison, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters(32 feet), cutting the chances of interference between your computer system and your portable telephon
9、e or television. Even with the low power, Bluetooth doesnt require line of sight between communicating devices. The Walls in your house wont stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms. Bluetooth can connect up to eight devices simultaneousl
10、y. With all of those devices in the same 10-meter(32-foot) radius; you might think theyd interfere with one another, but its unlikely. Bluetooth uses a technique called spread-spectrum.(扩展频谱 ) frequency that makes it rare for more than one device to be transmitting on the same frequency at the same
11、time. In this technique, a device will use. 79 individual, randomly chosen frequencies within a designated range, changing from one-to another on a regular basis. In the case of Bluetooth. the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a
12、limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, its unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetoo
13、th devices, since any interference on a particular frequency will last only a tiny fraction of a second. Piconets(个人域网络 ) Lets say you have a typical modern living room with the typical modern Stuff inside. Theres an entertainment system with a stereo, a DVD player, a satellite TV receiver and a tel
14、evision; theres also a cordless telephone and a-personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral(外围设备 ). The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer h
15、as programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in th
16、e range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since its not from within the network. The computer and entertainment system go through similar routines, establishing networks among addresses in rang
17、es established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the pieonets are completely separated from one another. Now the living room has three separate networks established,
18、 each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to. Since each network is changing the frequency of its operation thousands of times a second, its unlikely that any two networks will be on the same frequency at the sa
19、me time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with the networks business. Bluetooth Security In any wireless networking setup, security
20、 is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals arent intercepted. Bluetooth technology is no different its wireless and therefore susceptible to spying and remo
21、te access, just like WiFi is susceptible if the network isnt secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission. Bluetooth offers several security mo
22、des, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget(配件 ). In almost all cases, Bluetooth users can establish “trusted devices“ that can exchange data without asking permission. When any other device tries to establish a connection to the users gadget, the user
23、 has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and requir
24、e that users make a conscious decision to open a file or accept a, data transfer. As long as these measures are enabled on the users phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to “non-discoverable“ and avoid connecting with other Bluetoot
25、h devices entirely. If a user makes use of the Bluetooth network primarily for synching devices at home, this might be a good way to avoid any chance of a security breach while in public. Still, early cell-phone virus writers have taken advantage of Bluetooths automated connection process to send ou
26、t infected-files. However, since most cell phones use a secure Bluetooth connection that requires authorization and authentication before accepting data from an unknown device, the infected file typically doesnt get very far. Other problems like “bluejacking“, “bluebugging“ and “Car Whisperer“ have
27、turned up as Bluetooth-specific security issues. Like a computer security hole, these vulnerabilities are an inevitable result of technological innovation, and device manufacturers are releasing firmware upgrades that address new problems as they arise. 2 Bluetooth is changing small-area networking
28、into a wireless and automatic connection with no need for user intervention and low need of transmission power. ( A) Y ( B) N ( C) NG 3 Bluetooth networking transmits data via low-power radio waves between 2.402 GHz and 2.480 GHz. ( A) Y ( B) N ( C) NG 4 Making sure that Bluetooth and its connected
29、devices dont interfere with one another can be difficult. ( A) Y ( B) N ( C) NG 5 With the development of spread-spectrum technique, we may use Bluetooth connection as a substitute for cell phone. ( A) Y ( B) N ( C) NG 6 Any two networks in piconets is unlikely to be on the same frequency simultaneo
30、usly because each network is changing its_ thousands of times a second. 7 Manufacturers have developed_ to correct errors like receiving signal of the same frequency from a strange device. 8 Security is also a big concern as Bluetooth technology has an essence of_. 9 People can send you data without
31、 your permission because the Bluetooth connection is_. 10 One security mode offered by Bluetooth is that data may be exchanged freely among the devices Bluetooth users establish as_. 11 Vulnerabilities of Bluetooth like “bluejacking“ are_ in the development of technology. Section A Directions: In th
32、is section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation, one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will be a pause. During the pause, you must
33、read the four choices marked A, B, C and D, and decide which is the best answer. ( A) The woman may take the next train as well. ( B) The woman has been late for the train for one hour. ( C) Someone gave the wrong information to the woman. ( D) The woman should wait patiently until he got a schedule
34、. ( A) The woman will put off her decision to study. ( B) The woman will now just study rather than go out. ( C) The woman will go out because shes in a good mood. ( D) The woman will have to make a decision whether to study. ( A) The movie was really wonderful. ( B) The movie was so full of violent
35、 scenes. ( C) The movie wasnt as good as he had expected. ( D) The movie was overly concerned with romantic relationships. ( A) Deliver the package in person. ( B) Pick up the package at the post office. ( C) Find out the hours the post office is open. ( D) Ask to have the package delivered to his h
36、ome. ( A) He wont vote for the woman. ( B) He may also run for class president. ( C) He should promise to support the woman. ( D) The woman should ask his roommate to vote for her. ( A) Shes not a very good cook. ( B) Shes annoyed with the man. ( C) She didnt like the food the man prepared. ( D) She
37、 thinks the man should spend more time cooking. ( A) Hell probably talk about Chapter 16 in class today. ( B) Hell probably postpone the test until he talks Chapter 16. ( C) He might test the students on material not discussed in class. ( D) He usually tells the students ahead of time what will be o
38、n his tests. ( A) The boss was very considerate to his workers. ( B) Ed wasnt as good a worker as the boss thought. ( C) The boss had planned to give Ed a raise in salary. ( D) The boss has never considered raising the workers salary. ( A) Studying for a test. ( B) Visiting a close fiend of theirs.
39、( C) A class presentation theyre preparing. ( D) A television program the man is watching. ( A) He thought she preferred to study alone. ( B) He thought she had made arrangements to study with. ( C) He had told her that he had done poorly on a recent test. ( D) He didnt know that she was enrolled in
40、 a linear algebra course. ( A) He and Elizabeth argued recently. ( B) Hed rather study in his own dormitory. ( C) He heard Elizabeth did poorly on the last test. ( D) He doesnt want to bother Elizabeth so late in the evening. ( A) There was a traffic accident. ( B) A car was smashed by a falling obj
41、ect. ( C) A car hit someone near the high building. ( D) A driver was killed in his new car. ( A) The woman never reads newspaper. ( B) The man is always proud of his car. ( C) The woman had her new car damaged. ( D) The man had his old car insured. ( A) He had his car hit by a failing piece of conc
42、rete. ( B) He was fined for speeding in South Street. ( C) He had been unable to park his specially-made car. ( D) He could not claim anything from the insurance company. ( A) He was annoyed. ( B) He was pleased. ( C) He felt it could be replaced. ( D) He did not care. Section B Directions: In this
43、section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A, B, C and D. ( A) Nineteenth-century sea captains.
44、 ( B) The development of the steamship. ( C) The economic importance of sailing ships. ( D) Employment in the fishing and whaling industries. ( A) They were protected by a strong United States Navy. ( B) They were supported by a well-developed railroad. ( C) Most crew members had experience on forei
45、gn ships. ( D) As part owners of the ships, captains got some of the profits. ( A) They carried passengers, but not cargo. ( B) They were large, but surprisingly fast. ( C) They were the first successful steam-powered ships. ( D) They were more reliable than other ships of the 1860s. ( A) The effect
46、 of ordinary aspects of life on anthropology. ( B) A good source of information about a society. ( C) Attitudes toward culture in the 1940s. ( D) The relationship between anthropology and military. ( A) Students might not consider them to be an important part of culture. ( B) They symbolize the rebe
47、llion of youth in the 1950s. ( C) They are discussed in the students textbook. ( D) They have been worn for hundreds of years. ( A) To show how politics have changed over the years. ( B) To point out that T-shirts often provide personal information. ( C) To illustrate how the printing on clothing ha
48、s improved. ( D) To support that T-shirts are a form of art. ( A) How the President proposes new laws. ( B) How a bill is passed by lawmakers in Congress. ( C) How the President can reject a proposed law. ( D) How lawmakers can force the President to sign a bill. ( A) Why the President opposes a bil
49、l. ( B) How lawmakers want to revise a bill. ( C) Why a deadline has not been met. ( D) When lawmakers plan to end their session. ( A) They send the message to the President within ten days. ( B) They officially state reasons for rejecting the message. ( C) They meet with the President. ( D) They revise the vetoed bill. ( A) The bill becomes law immediately. ( B) The bill cant become law unless the whole process begins again. ( C) Lawmakers must review the bill within ten days. ( D)