欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    大学英语六级-182及答案解析.doc

    • 资源ID:1454268       资源大小:96KB        全文页数:14页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    大学英语六级-182及答案解析.doc

    1、大学英语六级-182 及答案解析(总分:100.00,做题时间:90 分钟)三、Passage 1(总题数:1,分数:20.00)Go (围棋) is an ancient Asian game. In recent years, computer experts, particularly those 1 in artificial intelligence, have felt the fascination. Programming other board games has been a relative snap. Even chess has 2 to the power of t

    2、he processor. Five years ago, a chess-playing computer called Deep Blue not only beat but thoroughly 3 Garry Kasparov, the world champion at that time. That is because chess, while highly complex, can be reduced to a matter of brute force computation. Go is different. Deceptively easy to learn, eith

    3、er for a computer or a human, it is a game of such depth and 4 that it can take years for a person to become a strong player. To date, no computer has been able to achieve a skill level beyond that of the casual player. The game is played on a board divided into a grid of 19 5 and 19 vertical lines.

    4、 Black and white pieces called stones are placed one at a time on the grid“s intersections. The object is to acquire and defend 6 by surrounding it with stones. Programmers working on Go see it as more accurate than chess in 7 the ways the human mind works. The challenge of programming a computer to

    5、 mimic that process goes to the core of artificial intelligence, which involves the study of learning and decision-making, strategic thinking, knowledge representation, pattern recognition and perhaps most intriguingly, intuition. In the 8 of a chess game, a player has an average of 25 to 35 moves a

    6、vailable. In Go, on the other hand, a player can choose from an average of 240 moves. A Go-playing computer would need about 30000 years to look as far ahead as Deep Blue can with chess in three seconds. But the 9 go deeper than processing power. Not only do Go programs have trouble evaluating posit

    7、ions quickly; they have trouble making it correctly. 10 , the allure (吸引力) of computer Go increases as the difficulties it poses encourages programmers to advance basic work in artificial intelligence. A. complexity B. Consequently C. course D. horizontal E. humbled F. humiliated G. Nonetheless H. o

    8、bstacles I. reflecting J. responding K. slanted L. specializing M. submitted N. subscribed O. territory(分数:20.00)四、Passage 2(总题数:1,分数:30.00)The Internet Is ClosingA. The Internet, perhaps the most important technological development of the past 30 years, succeeded unexpectedly. It started out in an

    9、experimental backwater, nurtured far from the mainstream. It was spawned with no business plan and with no CEO leading the charge. Instead, a group of researchers had the very un-entrepreneurial idea to develop a set of free and open technical protocols (协议) to move data from one place to another. B

    10、. The PC, which I think of as a companion technology to the Internet, likewise groomed as the hobbyhorse (过多谈论的话题) of passionate nerds who (at least initially) shared their designs. Both the Internet and the PC were released unfinished, and because they were open, technologies, businesses and invent

    11、ors could use them as a springboard for innovation. New applications were deployed to use them without needing the permission of their vendors. C. This kind of openness isn“t found in cars, fridges, TiVos or any other major technology. It“s what helped the Internet and PC succeed over more boring, p

    12、redictable counterparts- proprietary networks like CompuServe and information appliances like dedicated smart word processors. However, now that PCs and the Internet have become mainstream tools, there“s rising pressure to turn them into the appliances they defeated: to close them, in some cases for

    13、bidding outside mending altogether, and in others allowing it only under closely monitored and controlled circumstances. The Internet and the PC as wellsprings of innovation are living on borrowed time. D. The new closed models that represent the likely future of consumer computing and networking ar

    14、e no minor improvements. We face wholesale revision of the Internet and PC environment of the past several decades. The change is coming partly because of the need to address security problems peculiar to open technologies, and partly because businesses want more control over the experience that cus

    15、tomers have with their products. The trend from open systems toward closed ones threatens the culture of accidental mending that has given us the Web, instant messaging, peer-to-peer networking, Skype, Wikipedia and a host of other innovations, each of which emerged from left field. It will produce

    16、a concentrated set of new gatekeepers, with us and them prisoners to their limited business plans and to regulators who fear things that are new and disruptive. E. How is the Internet“s openness moving from virtue to vice? In the pre-Internet days, mainstream computing and networking were closed act

    17、ivities. The business world produced expensive networking gear for use in office networks and offered pay-per-minute services, like AOL and CompuServe, for consumers. Firms were prisoners to whatever network vendor provided their hardware and software, and consumers found a limited set of groomed of

    18、ferings from whichever walled garden they chose. F. The Internet“s flexibility soon outpaced both. Physicist Tim Berners-Lee invented the World Wide Web by publishing protocols by which interested people could describe a “page“ of content with links. Anyone could set up a server and offer content, a

    19、nd as the Internet began to accept connections with the public, choosing a network provider no longer meant locking oneself into a bundle of content. The Internet, with no plan for content or profit, ended up generating far more of both than proprietary competitors. G. In similar fashion the PC beca

    20、me essential to mainstream businesses and consumers. Within two years of the introduction of the Apple , which out of its box treated users to a blinking cursor (光标) awaiting further programming, Dan Bricklin and Bob Frankston had invented VisiCalc, the first digital spreadsheet (电子表格程序). The PC was

    21、 no longer merely personal. Word processors and smart typewriters couldn“t keep up with a device that could be a spreadsheet one second and a database the next. H. Today the soaring popularity and use of the Internet and PC have changed the equation. We wouldn“t want those cars, fridges or TiVos to

    22、be altered by unknown outsiders at the touch of a button, and yet this remains the prevailing way that we load new software on our PCs. That software is often rogue (胡作非为的), harvesting computing cycles and bandwidth from a PC in order to attack others, stealing personal data or simply frying the PC.

    23、 Those burned by these worsening phenomena will opt for security over flexibility. I. One model for security can be drawn from our familiar appliances, which are sealed when they leave the factory. No one but a true geek (怪人) could hack a car or a fridgeor would want to. We“ve seen glimpses of this

    24、sealed-in-the-factory nature in platforms such as iPods, most videogame consoles, e-book readers like the Amazon Kindle and cable-company set-top boxes. Steve Jobs at first locked down the iPhone in this waya product upon which he is betting the future of Apple. J. In a U-turn from the values of his

    25、 original Apple , Jobs intended Apple to completely program and control the phone. “The last thing you want is to have loaded three applications on your phone and then you go to make a call and it doesn“t work anymore. These are more like iPods than they are like computers.“ K. Of course, the Intern

    26、et or PC would have to be in truly bad shape for us to abandon them for such totally closed platforms; there are too many advantages to be able to do things that platform manufacturers don“t want or haven“t thought of. But there“s another model for lockdown that“s more subtle. L. This new model expl

    27、oits the Internet“s near ubiquitous (无处不在的) connectivity to let vendors change and monitor their technologies after they“ve left the factory. These technologies do let geeky outsiders build upon them, but in a highly controlled and contingent (视条件而定的) way. M. A great example is the iPhone 2.0, which

    28、 allows a thriving market for software written by outsidersso long as it is approved by and funneled through Apple. Another is Web 2.0 software-as-service ventures like the Facebook platform and Google Apps, where software is written to run out in the Internet “cloud“, on the vendor“s service. There

    29、, an application popular one day can be cancelled the next. N. A Scrabble-like program called Scrabulous was wildly popular on Facebookuntil the makers of Scrabble complained. Facebook was pressured to remove the application, even though the case for rights infringement was uncertain. Among iPhone s

    30、oftware developers there are tales of applications that are approved one day and vanish the next, without any explanation. Until recently, Apple told its developers that publicizing the death of an application would be seen as a breach of a non-disclosure agreementthreatening a complaining developer

    31、 with complete exclusion from the platform. O. Technologies like the Internet and the PC are civic in the sense that they depend on support and innovative outsiders to survive and grow. When civic technologies become popular enough to subvert, they need civic defense systems. I“m part of an institut

    32、ion developing free software that does just that. It helps PC users communicate with each other to defend themselves against rogue programs; before running new software, people can check to see if other members of the herd have run it, and how it worked out. The idea is to draft a critical mass of u

    33、sers to support the common protocols of the Internet, so that we don“t yet have to give up and call in the police or the Pinkertonsor Steve Jobs.(分数:30.00)(1).The openness helped the Internet and PC surpass counterparts-proprietary networks and information appliances.(分数:3.00)(2).The invention of th

    34、e Internet stemmed from an un-entrepreneurial idea of some researchers.(分数:3.00)(3).At first, Steve Jobs locked down the iPhone as some sealed-in-the-factory appliances.(分数:3.00)(4).A new model lets vendors change and monitor their technologies after they“ve left the factory by utilizing the Interne

    35、t“s near ubiquitous connectivity.(分数:3.00)(5).We have to revise the Internet and PC environment of the past several decades partly because the openness has serious security problems.(分数:3.00)(6).The Internet with no plan for content or profit ended up generating far more of both than proprietary com

    36、petitors.(分数:3.00)(7).Building civic defense systems needs to choose a critical mass of users to support the common protocols of the Internet.(分数:3.00)(8).Because the Internet and the PC were released uncompleted and they were open, many people use them as a springboard for innovation.(分数:3.00)(9).I

    37、t is hard for word processors and smart typewriters to keep up with the device that could move freely between a spreadsheet and a database.(分数:3.00)(10).Although the evidence for rights infringement is uncertain, Facebook was forced to remove the application.(分数:3.00)五、Passage 3(总题数:1,分数:25.00)An ex

    38、amination in a Midwest school asked the students to write a short essay on the subject: “The status symbols today are those other than money can buy.“ The paper was to be completed in an hour. The test reveals little except the unfortunate role of school in fostering and sanctioning bad writing habi

    39、ts. If Johnny can“t write, one of the reasons may be a conditioning based on speed rather than respect for the creative process. Speed is neither a valid test of nor a proper preparation for competence in writing. It makes for vagueness, insincerity, and disor ganization. It takes the beauty out of

    40、the language. It rules our respect for the reflective thought that should precede expression. It runs counter to be finely knit. This is not to minimize the value of genuine facility. With years of practice, a man may be able to put down words swiftly and expertly. But it is the same kind of swiftne

    41、ss that enables a cellist, after having invested years of efforts, to negotiate an intricate passage from Haydn. Speed writing is for stenographers (速记员) and court reporters, not for anyone who wants to use a language with precision and distinction. Thomas Mann was not ashamed to admit that he would

    42、 often take a full day to write 500 words, and another day to edit them, out of respect for the most difficult art in the world. Flaubert would ponder a paragraph for hours. Did it say what he wanted it to saynot approximately but exactly? Did the words turn into one another with proper rhythm and g

    43、race? Were they artistically and securely fitted together? Were they briskly alive, or were they full of fuzzy and ragged edges? Were they likely to make things happen inside the mind of the reader, igniting the imagination and touching off all sorts of new anticipations? These questions are relevan

    44、t not only for the established novelist but for any one who attaches value to words as a medium of expression and communication. E. B. White, whose respect for the environment of good writing is exceeded by no word artist of our time, would rather have his fingers cut off than to be guilty of handli

    45、ng words lightly. No sculptor chipping away at a granite (花岗岩) block in order to produce a delicate curve or feature has labored more painstakingly than White in fashioning a short paragraph. Obviously, we can“t expect our schools to make every Johnny into a White or a Flaubert or a Mann, but it is

    46、not unreasonable to expect more of them to provide the conditions that promote clear, careful and competent expression. Certainly the cumulative effort of the school experience should have to be undone in later years.(分数:25.00)(1).The main purpose of this passage is to _.(分数:5.00)A.present an origin

    47、al idea about writingB.describe a new writing processC.argue against an established reading practiceD.comment on writing skills and techniques(2).According to the passage, competence in writing is _.(分数:5.00)A.an art that needs lots of practiceB.a born ability that few people haveC.a skill that requ

    48、ires masters“ instructionsD.a technique that is easy to learn(3).According to the third paragraph, the author thinks good writings _.(分数:5.00)A.provide individuals with skills for successB.requires a long time to prepare and editC.accurately describe events as they occurD.communicate ideas and exper

    49、ience(4).In describing E. B. White as a “word artist“, the author means that White _.(分数:5.00)A.was able to make his descriptions colorfulB.had artistic backgroundC.illustrated his storiesD.was a great writer(5).According to the last paragraph, our schools should _.(分数:5.00)A.provide proper conditions for good writingB.stress the importance of writing speedC.encourage students to read more booksD.teach good writings by American writers六、Passage 4(总题数:1,分数:25.00)In a mere two years, the proportion of teenagers who expect to be financially dependent on their par


    注意事项

    本文(大学英语六级-182及答案解析.doc)为本站会员(proposalcash356)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开