- 欢迎访问河北自考网!为考生提供河北自考信息服务,供学习交流使用,非政府官方网站,官方信息以河北省教育考试院官网www.hebeea.edu.cn/为准。
2022年10月河北省自考英语科技文选00836试卷
2022年10月高等教育自学考试
英语科技文选试题
课程代码:00836
1. 请考生按规定用笔将所有试题的答案涂、写在答题纸上。
2. 答题前,考生务必将自己的考试课程名称、姓名、准考证号用黑色字迹的签字笔或钢笔 填写在答题纸规定的位置上。
选择题部分
注意事项:
每小题选出答案后,用2B铅笔把答题纸上对应题目的答案标号涂黑。如需改动,用橡皮
擦干净后,再选涂其他答案标号。不能答在试题卷上。
I. Directions: Read through the following passages. Choose the best answer and blacken
the corresponding letterA, B, C or D on the ANSWER SHEET.(20%)
(A)
Astronomy benefits greatly as the technology of producing higher quality and more powerful telescopes become increasingly more advanced. Three types of telescopes are used by astronomers: the reflecting telescope, the refracting telescope and the catadioptric
(a combination of the first two).
Reflecting telescopes are also called Newtonians. Reflecting telescopes use mirrors instead of lenses. They are usually built with two mirrors. One is the primary and one is the secondary. The primary mirror is the largest one. Light gathered there is reflected to
the secondary mirror and then to the eyepiece. The eyepiece magnifies the image.
The fact that a telescope has mirrors is a positive factor because mirrors do not have chromatic aberration like lenses.Lenses are found in refracting telescopes which bend light differently depending on the wavelength. Chromatic aberration is a situation where colors are not correctly bent by the lens. They all do not combine at the focus well.
Therefore, a halo, or fringe, occurs around objects.
Mirrors produce better images than lenses because they reflect all wavelengths of light equally. A reflecting telescope is less expensive than the other two kinds. Because of
the simpler design and lower cost, reflecting telescopes can incorporate bigger reflectors.
The size of the main mirror or lens of a telescope is called the aperture, as can be seen from the size of the aperture that determines how much light can be gathered in by the
telescope. The bigger the area of the aperture is, the more light can be let in.
Reflecting telescopes do have some disadvantages. One defect is called a coma. It causes an image to look like a comet around the edge.Images can be fuzzy if the temperature of the mirror and the air outside is different. Collimation refers to the proper alignment of the two mirrors. The mirrors can get out of alignment easily, by handling the telescope or moving it to another location. The mirrors do have to be cleaned frequently
also.
Refracting telescopes use lenses instead of mirrors. The maintenance necessary for this type of telescope is less than with the reflecting one. One of the greatest advantages of the refracting telescope is that the lenses do not have to be collimated. The lenses in the refracting telescope do not move. They are fixed. The design of a refracting telescope makes this type much heartier than the reflecting telescope. It will withstand handling
better.
Refracting telescopes do not have a secondary lens, like the secondary mirror of the reflecting type. This means that the light is not blocked on its way to the eyepiece. Thus, the images are better. The lens is not affected by the temperature outside or air currents because the air tube is closed. The image can be clearer. The eyepiece is located at the end of the tube. This makes it easier for viewing. On a reflecting telescope, the eyepiece is
located on the top of the tube.
Refracting telescopes can be expensive. They suffer from chromatic aberration. Making a large lens in this type of telescope is difficult because of the weight involved.
The telescope itself is usually rather heavy, making it difficult to transport.
Catadioptric telescopes are a hybrid of the two other types. They are shorter. That means they can be moved more easily. They also have less chromatic aberration. However, they are more expensive than reflecting telescopes.They also have to be collimated, although less often than a reflecting type. They still have the obstruction caused by a secondary mirror.
1. One of the main differences between a reflecting telescope and a refracting telescope is
that a reflecting telescope has all the following EXCEPT
A. lensesB. mirrors
C. eyepiece on top of the tubeD. aperture
2.The word“ aperture”in line 5, para.4,is closest in meaning to
A. lens B. air tube
C. opening D. mirror
3.Which of the following statements is NOT true?
A. Catadioptric telescopes have to be collimated.
B. Catadioptric telescopes are a combination of the other two types of telescopes.
C. The primary mirror of a reflecting telescope is the largest one.
D. Refracting telescopes have a secondary lens.
4. The disadvantage of a reflecting telescope is that it
A. has chromatic aberrationB. requires collimation
C. is very heavyD. is very expensive
5.Which of the following is true?
A. Reflecting telescopes are also called Newtonians.
B. Reflecting telescopes use lenses.
C. A coma can be found in a refracting telescope.
D. In a catadioptric telescope, the air tube is very long.
(B)
The average computer user has between 5 and 15 username/password combinations to log in to email accounts,social networking sites,discussion boards, news and entertainment sites, online stores, online banking accounts, or other websites. For people who use email or other internet applications at work, the number of required usename/password combinations may surpass 30.Some of these accounts demand that you use a specific number of symbols and digits, while others require you to change your password every 60 days. When you add to this list the codes needed to access things like ATMs, home alarm systems, padlocks, or voicemail, the number of passwords becomes
staggering.
The feeling of frustration that results from maintaining a memorized list of login credentials has grown so prevalent that it actually has a name: password fatigue. Having to remember so many different passwords is irritating, but it can also be dangerous. Because it is virtually impossible to remember a unique password for each of these accounts, many
people leave handwritten lists of usernames and passwords on or next to their computers.
Others solve this problem by using the same password for every account or using
extremely simple passwords. While these practices make it easier to remember login information, they also make it exponentially easier for thieves to hack into accounts. Single sign-on(SSO)authentication and password management software can help mitigate this problem, but there are drawbacks to both approaches. SSO authentication can be used for related, but independent software systems. With SSO, users log in once to access a variety of different applications. Users only need to remember one password to log in to the main system; the SSO software then automatically logs the user in to other accounts within the system.SSO software is typically used by large companies, schools, or libraries.Password management software, such as KeePass and Password Safe, is most often used on personal computers. These software programs—which have been built into many major web browsers—store passwords in a remote database and automatically
“remember”users' passwords for a variety of sites.
The problem with both SSO authentication and password management software is that the feature that makes them useful is also what makes them vulnerable.If a user loses or forgets the password required to log in to SSO software, the user will then lose access to all of the applications linked to the SSO account. Furthermore, if a hacker can crack the SSO password, he or she will then have access to all of the linked accounts.
Users who rely on password management software are susceptible to the same problems, but they also incur the added threat of passwords being compromised because of computer theft. Although most websites or network systems allow users to recover or change lost passwords by providing email addresses or answering a prompt, this process can waste time and cause further frustration. What is more, recovering a forgotten password is only a temporary solution; it does not address the larger problem of password
fatigue.
Some computer scientists have suggested that instead of passwords, computers rely on biometrics. This is a method of recognizing human users based on unique traits, such as fingerprints,voice, or DNA. Biometric identification is currently used by some government agencies and private companies, including the Department of Defense and Disney World. While biometrics would certainly eliminate the need for people to remember passwords, the use of biometrics raises ethical questions concerning privacy
and can also be expensive to implement.
The problems associated with SSO, password management software, and biometrics continue to stimulate sofftware engineers and computer security experts to search for the
cure to password fatigue. Until they find the perfect solution, however, everyone will
simply have to rely on the flawed password.
6. The passage discusses all of the following solutions to password fatigue EXCEPT
.
A. using very simple passwords give
B. intelligent encryption
C. voice-recognition software
D. writing the passwords down on a piece of paper
7. As used in paragraph 3, which is the best synonym for mitigate?
A. predict B. postpone
C. investigate D. lessen
8. Which of the following statements from the passage represents an opinion, as opposed to
a fact?
A.“For people who use email or other internet applications at work, the number of required username/password combinations may surpass 30.”
B.“The feeling of frustration that results from maintaining a memorized list of login credentials has grown so prevalent that it actually has a name: password fatigue.”
C.“Having to remember so many different passwords is irritating, but it can also be dangerous.”
D.“Additionally, recovering a forgotten password is only a temporary solution; it does not address the larger problem of password fatigue.”
9. In paragraph 6, the author notes that“the use of biometrics raises ethical questions concerning privacy.”Which of the following situations could be used as an example to illustrate this point?
A. A thief steals a personal computer with password management software and gains access to private email accounts, credit card numbers, and bank statements.
B. An employee at a company uses a voice recognition system to log in to his computer, only to be called away by his boss.While he is away from the computer but still logged in,another employee snoops on his computer and reads personal email correspondence.
C. A computer hacker gains access to a system that uses SSO software by cracking the password, thus gaining private access to all linked accounts.
D. A company that employs fingerprint identification security software turns over its database of fingerprints to the local police department when a violent crime occurs on its grounds.
10. In the last paragraph, the author's tone can best be described as A. angry B. resigned
C. confused D. hopeful
非选择题部分
注意事项;
用黑色字迹的签字笔或钢笔将答案写在答题纸上,不能答在试题卷上。
Ⅱ.Directions:Add the affix to each word according to the given Chinese, making changes when necessary. Write your answer on the ANSWER SHEET.(8%)
11. predict不可预测地12.quantitative使量化
13. period周期的14.flame易燃烧的
15. scan扫描仪16.credible可信性
17. nutrition营养学家18.exclude除外的
Ⅲ. Directions:Fill in the blanks, each using one of the given words or phrases below in its proper form and write your answer on the ANSWER SHEET.(12%)
revolve around wind up all the same a fraction of a second
cater forsubmit toin the worksfond of
exposure toemanate fromfocus onfrom …point of view
19. Several large investments in narural resources are
20. It was a logical conclusion the child's
21,He his business and personal affairs before joining the army.
22. The expression is ungrammatical; it is a part of the common tongue.
23. Iexpect he will be able to your particular needs. 24, She suffered a massive toxic chemicals.
25. He would not defeat.
26. The discussion a new plan to increase profits.
27. Much of the criticism against him his political opponents.
28. The message arrives in your brain in
29. Did you ever see anyone so dancing?
30. The professor asked the students to the context when reading a passage.
IV. Directions:Fill in each blank with a suitable word given below and write your answer on the ANSWER SHEET.(10%)
more by anticipated future due
frequently published since suggested number
Fires get started in one of two ways--- by humans or lightning. Both are growing in 31.Lightning strikes may become more frequent in some places 32 to climate change. Generally,lightning occurs more 33 in hot weather than cold weather.A 2014 study in the journal Science 34 that the number of lightning strikes in the United States could increase 35 about 12 percent for every degree Celsius of warming. Other research has 36 that lightning-driven fres are already becoming more frequent in some places. A study 37 earlier this year in Nature Climate Change found that lightning ignitions(着火) in North America's northern boreal(北方的) forests have increased 381975.And the researchers say that 39 warming may cause more storms, more lightning and potentially 40 fires in the
northern regions.
V.Directions: Translate the following sentences into English, each using one of the given words or phrases below. Write your answer on the ANSWER SHEET.(10%)
look into wipe out out of phase take on in advance
41. 这种昆虫能随环境而变化其颜色。
42. 你永远不能把过去一笔勾销。
43. 会谈的主题将提前一周宣布。
44. 最终他们同意调查这件事情。
45. 昨天,这里的红绿灯信号不协调。
VI. Directions:Translate the following paragraph into Chinese. Write your answer on the ANSWER SHEET.(15%)
46. Night mode is one of those features you may be aware of only because your phone keeps telling you about it. At some point while you are lying in bed at night sending texts, your screen may politely suggest you activate a function that shifts the colours of your screen from the colder to the warmer end of the spectrum. It is supposed to help you sleep better. Findings in a study suggest this is the very opposite of correct. The research, carried out on mice, appears to rubbish the notion that blue light disrupts sleep.
VI. Directions:Read the following passage, and then fill in the table with the information based on the passage. Write your answer on the ANSWER SHEET.(10%)
It is now possible to hear a recording of Caruso's singing that is far superior to any made during his lifetime. A decades-old wax-cylinder recording of this great operatic tenor
has been digitized, and the digitized signal has been processed by computer to remove the
extraneous sound, or“noise,”introduced by the now“ancient”wax-cylinder recording
process.
Although this digital technique needs improvements, it represents a new and superior way of recording and processing sound which overcomes many of the limitations of analog recording. In analog recording systems, the original sound is represented as a continuous waveform created by variations in the sound's amplitude over time. When analog playback systems reproduce this waveform, however, they invariably introduce distortions. First, the waveform produced during playback differs somewhat from the original waveform. Second, the medium that stores the analog recording creates noise during playback which
gets added to the recorded sounds.
Digital recordings,by contrast, reduce the original sound to a series of discrete numbers that represent the sound's waveform. Because the digital playback system“reads” only numbers,any noise and distortion that may accumulate during storage and manipulation of the digitized signal will have little effect: as long as the numbers remain recognizable, the original waveform will be reconstructed with little loss in quality. However, because the waveform is continuous, while its digital representation is composed of discrete numbers, it is impossible for digital systems to avoid some distortion. One kind of distortion, called“sampling error,”occurs if the sound is sampled too infrequently, so that the amplitude changes more than one quantum between samplings. In effect, the sound is changing too quickly for the system to record it accurately. A second form of distortion is“quantizing error,”which arises when the amplitude being measured is not a whole number of quanta, forcing the digital recorder to round off.Over the long term, these errors are random, and the noise produced is similar to analog noise except that it only occurs
when recorded sounds are being reproduced.
Digital Recording
The first
paragraph
shows that Caruso's singing
now processed by computer, or
47,is of a lot better qualityComparatively
speaking, the
digital technique
is sure 48 to
analog
recording.One of the
main
differences
between digital
technique and
analog
recording
system is 49,or
noise.To avoid the kind of distortion
named
“sampling
error”, the sound should be sampled
more 50.It does not mean that the digital
recording
system is 51,as
there are still
some
improvements to be made in the future.
VM. Directions:Write a passage(150-200 words)in English on the following title. Develop the ideas according to the Chinese outline given below. Write your passage on the ANSWER SHEET.(15%)
52. What discovery in the last 100 years has been most beneficial for people?
(1)你认为过去一百年中最有益于人类的发现是什么?
(2)请用具体的理由和例子支持你的观点。
上一篇:2022年10月河北省自考外语教学法00833试卷
下一篇:2022年10月河北省自考旅游英语选读00837试卷
最近更新
- 2022年10月河北省自考经济学( 二) 00889试卷 12-27
- 2022年10月河北省自考学前教育心理学... 12-27
- 2022年10月河北省自考日语00840试卷 12-27
- 2022年10月河北省自考警察组织行为学... 12-27
- 2022年10月河北省自考德语00842试卷 12-27
- 2022年10月河北省自考法语00841试卷 12-27
- 2022年10月河北省自考第二外语(俄语)... 12-27
- 2022年10月河北省自考语言与文化00838试卷 12-27
- 2022年10月河北省自考旅游英语选读00837试卷 12-27
河北自考政策公告
- 2023年上半年中小学教师资格考试(笔... 03-08
- 关于发布2022年下半年河北省高等教育... 02-17
- 关于推迟发布2022年下半年河北省高等... 01-09
- 2023年上半年河北省高等教育自学考试... 12-30
- 2023年河北省全国硕士研究生招生考试... 12-22
- 2023年河北省全国硕士研究生招生考试... 12-19
- 2023年河北省全国硕士研究生招生考试... 12-16
- 2023年河北省普通高校招生美术类专业... 12-16
- 2023年河北省全国硕士研究生招生考试... 12-15

扫一扫加入微信交流群
与其他自考生一起互动、学习探讨,提升自己。

扫一扫关注微信公众号
随时获取自考信息以及各类学习资料、学习方法、教程。
扫码小程序进入自考查询

查看了解自考专业
查询最新自考教材
查询最新政策公告
进入历年真题学习
