[外语类试卷]大学英语六级模拟试卷80及答案与解析.doc
《[外语类试卷]大学英语六级模拟试卷80及答案与解析.doc》由会员分享,可在线阅读,更多相关《[外语类试卷]大学英语六级模拟试卷80及答案与解析.doc(34页珍藏版)》请在麦多课文档分享上搜索。
1、大学英语六级模拟试卷 80及答案与解析 一、 Part I Writing (30 minutes) 1 For this part, you are allowed 30 minutes to write a short essay on the topic Do We Need “Never give up“? You should write at least 150 words following the outline given below in Chinese: 1 “永不言 弃 ”一直被认为是一种积极的生活态度,是个人成功的关键因素 2但是,也有人认为适当的放弃才是明智的选择
2、3你对此的看法及理由 Do We Need “Never give up“? 二、 Part II Reading Comprehension (Skimming and Scanning) (15 minutes) Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions attached to the passage. For questions 1-4, mark: Y (for YES) if the statement agree
3、s with the information given in the passage; N (for NO) if the statement contradicts the information given in the passage; NG (for NOT GIVEN) if the information is not given in the passage. 2 Bluetooth When you use computers, entertainment systems or telephones, the various pieces-and parts of the s
4、ystems make up a community of electronic devices. These devices communicate with each other using a variety of wires, cables, radio signals and infrared light(红外线 ) beams, and an even greater variety of connectors and plugs. The art of connecting things is becoming more and more complex every day. A
5、nd Bluetooth has now become a new popular method of connecting devices that can streamline the process. A Bluetooth connection is wireless and automatic, and it takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to sa
6、ve battery power. Bluetooth Operation Bluetooth networking transmits data via low-power radio waves. It communicates on a frequency of 2.45 gigahertz(千兆赫 )(actually between 2.402 GHz and 2.480 GHz, to be exact). This frequency band has been set aside by international agreement for the use of industr
7、ial, scientific and medical devices(ISM). A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors(微型监视器 ), garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. One of the ways Bluetooth devi
8、ces avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt. By comparison, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters (32 feet), cutting the chances of interference bet
9、ween your computer system and your portable telephone or television. Even with the low power, Bluetooth doesnt require line of sight between communicating devices. The walls in your house wont stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms. Blu
10、etooth can connect up to eight devices simultaneously. With all of those devices in the same 10-meter (32-foot) radius, you might think theyd interfere with one another, but its un- likely. Bluetooth uses a technique called spread-spectrum(扩展频谱 ) frequency that makes it rare for more than one device
11、 to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every seco
12、nd, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, its unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that
13、portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second. Piconets(个人域网络 ) Lets say you have a typical modern living room with the typical modern stuff inside. Theres an entertainment system with a st
14、ereo, a DVD player, a satellite TV receiver and a television; theres also a cordless telephone and a personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral(外围设备 ). The cordless telephone has one Bluetooth transmitter in th
15、e base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of ad- dresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a p
16、articular range. Since the handset has an address in the range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since its not from within the network. The computer and entertainment system go through similar
17、routines, establishing networks among addresses in ranges established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the piconets are completely separated from one another. Now t
18、he living room has three separate networks established, each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to. Since each network is changing the frequency of its operation thousands of times a second, its unlikely that a
19、ny two networks will be on the same frequency at the same time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with the networks business. Blueto
20、oth Security In any wireless networking setup, security is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals arent intercepted. Bluetooth technology is no different it
21、s wireless and therefore susceptible to spying and remote access, just like Wi-Fi is susceptible if the network isnt secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data witho
22、ut your permission. Bluetooth offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget(配件 ). In almost all cases, Bluetooth users can establish “trusted devices“ that can exchange data without asking permission. When any other device tries
23、 to establish a connection to the users gadget, the user has to decide to allow it. Service level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use
24、 of Bluetooth services to the registered user and require that users make a conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the users phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to “non
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外语类 试卷 大学 英语六级 模拟 80 答案 解析 DOC
