2022年10月河北省自考英語科技文選00836試卷
2025-07-09 來源:中國教育在線
2022年10月高等教育自學考試
英語科技文選試題
課程代碼:00836
1. 請考生按規定用筆將所有試題的答案涂、寫在答題紙上。
2. 答題前,考生務必將自己的考試課程名稱、姓名、準考證號用黑色字跡的簽字筆或鋼筆 填寫在答題紙規定的位置上。
選擇題部分
注意事項:
每小題選出答案后,用2B鉛筆把答題紙上對應題目的答案標號涂黑。如需改動,用橡皮
擦干凈后,再選涂其他答案標號。不能答在試題卷上。
I. Directions: Read through the following passages. Choose the best answer and blacken
the corresponding letterA, B, C or D on the ANSWER SHEET.(20%)
(A)
Astronomy benefits greatly as the technology of producing higher quality and more powerful telescopes become increasingly more advanced. Three types of telescopes are used by astronomers: the reflecting telescope, the refracting telescope and the catadioptric
(a combination of the first two).
Reflecting telescopes are also called Newtonians. Reflecting telescopes use mirrors instead of lenses. They are usually built with two mirrors. One is the primary and one is the secondary. The primary mirror is the largest one. Light gathered there is reflected to
the secondary mirror and then to the eyepiece. The eyepiece magnifies the image.
The fact that a telescope has mirrors is a positive factor because mirrors do not have chromatic aberration like lenses.Lenses are found in refracting telescopes which bend light differently depending on the wavelength. Chromatic aberration is a situation where colors are not correctly bent by the lens. They all do not combine at the focus well.
Therefore, a halo, or fringe, occurs around objects.
Mirrors produce better images than lenses because they reflect all wavelengths of light equally. A reflecting telescope is less expensive than the other two kinds. Because of
the simpler design and lower cost, reflecting telescopes can incorporate bigger reflectors.
The size of the main mirror or lens of a telescope is called the aperture, as can be seen from the size of the aperture that determines how much light can be gathered in by the
telescope. The bigger the area of the aperture is, the more light can be let in.
Reflecting telescopes do have some disadvantages. One defect is called a coma. It causes an image to look like a comet around the edge.Images can be fuzzy if the temperature of the mirror and the air outside is different. Collimation refers to the proper alignment of the two mirrors. The mirrors can get out of alignment easily, by handling the telescope or moving it to another location. The mirrors do have to be cleaned frequently
also.
Refracting telescopes use lenses instead of mirrors. The maintenance necessary for this type of telescope is less than with the reflecting one. One of the greatest advantages of the refracting telescope is that the lenses do not have to be collimated. The lenses in the refracting telescope do not move. They are fixed. The design of a refracting telescope makes this type much heartier than the reflecting telescope. It will withstand handling
better.
Refracting telescopes do not have a secondary lens, like the secondary mirror of the reflecting type. This means that the light is not blocked on its way to the eyepiece. Thus, the images are better. The lens is not affected by the temperature outside or air currents because the air tube is closed. The image can be clearer. The eyepiece is located at the end of the tube. This makes it easier for viewing. On a reflecting telescope, the eyepiece is
located on the top of the tube.
Refracting telescopes can be expensive. They suffer from chromatic aberration. Making a large lens in this type of telescope is difficult because of the weight involved.
The telescope itself is usually rather heavy, making it difficult to transport.
Catadioptric telescopes are a hybrid of the two other types. They are shorter. That means they can be moved more easily. They also have less chromatic aberration. However, they are more expensive than reflecting telescopes.They also have to be collimated, although less often than a reflecting type. They still have the obstruction caused by a secondary mirror.
1. One of the main differences between a reflecting telescope and a refracting telescope is
that a reflecting telescope has all the following EXCEPT
A. lensesB. mirrors
C. eyepiece on top of the tubeD. aperture
2.The word“ aperture”in line 5, para.4,is closest in meaning to
A. lens B. air tube
C. opening D. mirror
3.Which of the following statements is NOT true?
A. Catadioptric telescopes have to be collimated.
B. Catadioptric telescopes are a combination of the other two types of telescopes.
C. The primary mirror of a reflecting telescope is the largest one.
D. Refracting telescopes have a secondary lens.
4. The disadvantage of a reflecting telescope is that it
A. has chromatic aberrationB. requires collimation
C. is very heavyD. is very expensive
5.Which of the following is true?
A. Reflecting telescopes are also called Newtonians.
B. Reflecting telescopes use lenses.
C. A coma can be found in a refracting telescope.
D. In a catadioptric telescope, the air tube is very long.
(B)
The average computer user has between 5 and 15 username/password combinations to log in to email accounts,social networking sites,discussion boards, news and entertainment sites, online stores, online banking accounts, or other websites. For people who use email or other internet applications at work, the number of required usename/password combinations may surpass 30.Some of these accounts demand that you use a specific number of symbols and digits, while others require you to change your password every 60 days. When you add to this list the codes needed to access things like ATMs, home alarm systems, padlocks, or voicemail, the number of passwords becomes
staggering.
The feeling of frustration that results from maintaining a memorized list of login credentials has grown so prevalent that it actually has a name: password fatigue. Having to remember so many different passwords is irritating, but it can also be dangerous. Because it is virtually impossible to remember a unique password for each of these accounts, many
people leave handwritten lists of usernames and passwords on or next to their computers.
Others solve this problem by using the same password for every account or using
extremely simple passwords. While these practices make it easier to remember login information, they also make it exponentially easier for thieves to hack into accounts. Single sign-on(SSO)authentication and password management software can help mitigate this problem, but there are drawbacks to both approaches. SSO authentication can be used for related, but independent software systems. With SSO, users log in once to access a variety of different applications. Users only need to remember one password to log in to the main system; the SSO software then automatically logs the user in to other accounts within the system.SSO software is typically used by large companies, schools, or libraries.Password management software, such as KeePass and Password Safe, is most often used on personal computers. These software programs—which have been built into many major web browsers—store passwords in a remote database and automatically
“remember”users' passwords for a variety of sites.
The problem with both SSO authentication and password management software is that the feature that makes them useful is also what makes them vulnerable.If a user loses or forgets the password required to log in to SSO software, the user will then lose access to all of the applications linked to the SSO account. Furthermore, if a hacker can crack the SSO password, he or she will then have access to all of the linked accounts.
Users who rely on password management software are susceptible to the same problems, but they also incur the added threat of passwords being compromised because of computer theft. Although most websites or network systems allow users to recover or change lost passwords by providing email addresses or answering a prompt, this process can waste time and cause further frustration. What is more, recovering a forgotten password is only a temporary solution; it does not address the larger problem of password
fatigue.
Some computer scientists have suggested that instead of passwords, computers rely on biometrics. This is a method of recognizing human users based on unique traits, such as fingerprints,voice, or DNA. Biometric identification is currently used by some government agencies and private companies, including the Department of Defense and Disney World. While biometrics would certainly eliminate the need for people to remember passwords, the use of biometrics raises ethical questions concerning privacy
and can also be expensive to implement.
The problems associated with SSO, password management software, and biometrics continue to stimulate sofftware engineers and computer security experts to search for the
cure to password fatigue. Until they find the perfect solution, however, everyone will
simply have to rely on the flawed password.
6. The passage discusses all of the following solutions to password fatigue EXCEPT
.
A. using very simple passwords give
B. intelligent encryption
C. voice-recognition software
D. writing the passwords down on a piece of paper
7. As used in paragraph 3, which is the best synonym for mitigate?
A. predict B. postpone
C. investigate D. lessen
8. Which of the following statements from the passage represents an opinion, as opposed to
a fact?
A.“For people who use email or other internet applications at work, the number of required username/password combinations may surpass 30.”
B.“The feeling of frustration that results from maintaining a memorized list of login credentials has grown so prevalent that it actually has a name: password fatigue.”
C.“Having to remember so many different passwords is irritating, but it can also be dangerous.”
D.“Additionally, recovering a forgotten password is only a temporary solution; it does not address the larger problem of password fatigue.”
9. In paragraph 6, the author notes that“the use of biometrics raises ethical questions concerning privacy.”Which of the following situations could be used as an example to illustrate this point?
A. A thief steals a personal computer with password management software and gains access to private email accounts, credit card numbers, and bank statements.
B. An employee at a company uses a voice recognition system to log in to his computer, only to be called away by his boss.While he is away from the computer but still logged in,another employee snoops on his computer and reads personal email correspondence.
C. A computer hacker gains access to a system that uses SSO software by cracking the password, thus gaining private access to all linked accounts.
D. A company that employs fingerprint identification security software turns over its database of fingerprints to the local police department when a violent crime occurs on its grounds.
10. In the last paragraph, the author's tone can best be described as A. angry B. resigned
C. confused D. hopeful
非選擇題部分
注意事項;
用黑色字跡的簽字筆或鋼筆將答案寫在答題紙上,不能答在試題卷上。
Ⅱ.Directions:Add the affix to each word according to the given Chinese, making changes when necessary. Write your answer on the ANSWER SHEET.(8%)
11. predict不可預測地12.quantitative使量化
13. period周期的14.flame易燃燒的
15. scan掃描儀16.credible可信性
17. nutrition營養學家18.exclude除外的
Ⅲ. Directions:Fill in the blanks, each using one of the given words or phrases below in its proper form and write your answer on the ANSWER SHEET.(12%)
revolve around wind up all the same a fraction of a second
cater forsubmit toin the worksfond of
exposure toemanate fromfocus onfrom …point of view
19. Several large investments in narural resources are
20. It was a logical conclusion the child's
21,He his business and personal affairs before joining the army.
22. The expression is ungrammatical; it is a part of the common tongue.
23. Iexpect he will be able to your particular needs. 24, She suffered a massive toxic chemicals.
25. He would not defeat.
26. The discussion a new plan to increase profits.
27. Much of the criticism against him his political opponents.
28. The message arrives in your brain in
29. Did you ever see anyone so dancing?
30. The professor asked the students to the context when reading a passage.
IV. Directions:Fill in each blank with a suitable word given below and write your answer on the ANSWER SHEET.(10%)
more by anticipated future due
frequently published since suggested number
Fires get started in one of two ways--- by humans or lightning. Both are growing in 31.Lightning strikes may become more frequent in some places 32 to climate change. Generally,lightning occurs more 33 in hot weather than cold weather.A 2014 study in the journal Science 34 that the number of lightning strikes in the United States could increase 35 about 12 percent for every degree Celsius of warming. Other research has 36 that lightning-driven fres are already becoming more frequent in some places. A study 37 earlier this year in Nature Climate Change found that lightning ignitions(著火) in North America's northern boreal(北方的) forests have increased 381975.And the researchers say that 39 warming may cause more storms, more lightning and potentially 40 fires in the
northern regions.
V.Directions: Translate the following sentences into English, each using one of the given words or phrases below. Write your answer on the ANSWER SHEET.(10%)
look into wipe out out of phase take on in advance
41. 這種昆蟲能隨環境而變化其顏色。
42. 你永遠不能把過去一筆勾銷。
43. 會談的主題將提前一周宣布。
44. 最終他們同意調查這件事情。
45. 昨天,這里的紅綠燈信號不協調。
VI. Directions:Translate the following paragraph into Chinese. Write your answer on the ANSWER SHEET.(15%)
46. Night mode is one of those features you may be aware of only because your phone keeps telling you about it. At some point while you are lying in bed at night sending texts, your screen may politely suggest you activate a function that shifts the colours of your screen from the colder to the warmer end of the spectrum. It is supposed to help you sleep better. Findings in a study suggest this is the very opposite of correct. The research, carried out on mice, appears to rubbish the notion that blue light disrupts sleep.
VI. Directions:Read the following passage, and then fill in the table with the information based on the passage. Write your answer on the ANSWER SHEET.(10%)
It is now possible to hear a recording of Caruso's singing that is far superior to any made during his lifetime. A decades-old wax-cylinder recording of this great operatic tenor
has been digitized, and the digitized signal has been processed by computer to remove the
extraneous sound, or“noise,”introduced by the now“ancient”wax-cylinder recording
process.
Although this digital technique needs improvements, it represents a new and superior way of recording and processing sound which overcomes many of the limitations of analog recording. In analog recording systems, the original sound is represented as a continuous waveform created by variations in the sound's amplitude over time. When analog playback systems reproduce this waveform, however, they invariably introduce distortions. First, the waveform produced during playback differs somewhat from the original waveform. Second, the medium that stores the analog recording creates noise during playback which
gets added to the recorded sounds.
Digital recordings,by contrast, reduce the original sound to a series of discrete numbers that represent the sound's waveform. Because the digital playback system“reads” only numbers,any noise and distortion that may accumulate during storage and manipulation of the digitized signal will have little effect: as long as the numbers remain recognizable, the original waveform will be reconstructed with little loss in quality. However, because the waveform is continuous, while its digital representation is composed of discrete numbers, it is impossible for digital systems to avoid some distortion. One kind of distortion, called“sampling error,”occurs if the sound is sampled too infrequently, so that the amplitude changes more than one quantum between samplings. In effect, the sound is changing too quickly for the system to record it accurately. A second form of distortion is“quantizing error,”which arises when the amplitude being measured is not a whole number of quanta, forcing the digital recorder to round off.Over the long term, these errors are random, and the noise produced is similar to analog noise except that it only occurs
when recorded sounds are being reproduced.
Digital Recording
The first
paragraph
shows that Caruso's singing
now processed by computer, or
47,is of a lot better qualityComparatively
speaking, the
digital technique
is sure 48 to
analog
recording.One of the
main
differences
between digital
technique and
analog
recording
system is 49,or
noise.To avoid the kind of distortion
named
“sampling
error”, the sound should be sampled
more 50.It does not mean that the digital
recording
system is 51,as
there are still
some
improvements to be made in the future.
VM. Directions:Write a passage(150-200 words)in English on the following title. Develop the ideas according to the Chinese outline given below. Write your passage on the ANSWER SHEET.(15%)
52. What discovery in the last 100 years has been most beneficial for people?
(1)你認為過去一百年中最有益于人類的發現是什么?
(2)請用具體的理由和例子支持你的觀點。