a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 173|回复: 3

[六级阅读] 2012年大学英语六级快速阅读冲刺题(6)

[复制链接]
发表于 2012-8-14 10:30:44 | 显示全部楼层 |阅读模式
Smartphones 6 w9 _; k' V( P5 B( h
     
# g, j# T0 Q4 R3 ]    A smartphone is one device that can take care of all of your handheld computing and communication needs in a single, small package. It’s not so much a distinct class of products as it is a different set of standards for cell phones to live up to. " c& i% ]  d1 T4 `

7 j$ D& l9 p" V    Basics of a Smartphone www.examw.com7 h, f+ T& }1 |; W! `
     
& {( z& d! t9 I    Unlike many traditional cell phones, smartphones allow individual users to install, configure and run applications of their choosing. A smartphone offers the ability to conform the device to your particular way of doing things. Most standard cell-phone software offers only limited choices for re-configuration, forcing you to adapt to the way it’s set up. On a standard phone, whether or not you like the built-in calendar application, you are stuck with it except for a few minor tweaks (调节). If that phone were a smartphone, you could install any compatible calendar application you like.
& |5 Z: v4 \+ n! b     + b' I0 Q& C6 o* ?; S9 l
    Since cell phones and PDAs are the most common handheld devices today, a smartphone is usually either a phone with added PDA capabilities or a PDA with added phone capabilities. Smartphones can do many things: sending and receiving mobile phone calls, Personal Information Management (PIM) including notes, calendar and to-do list, communication with laptop or desktop computers, data synchronization with applications like Microsoft Outlook and Apple’s iCal calendar programs, E-mail, instant messaging , and playing audio and video files in some standard formats.
, V6 Y" U7 j# V% A     " Y7 j+ v4 @! d
    Future applications promise to be even more impressive. For example, the Nokia 6131 is a phone utilizing near field communication (NFC) to allow the phone to act as a wireless credit card . The phone uses a two-way communication system to transfer payment information to pads at certain retail stores. Currently, it’s still in the trial phase of development.
# @- q3 I3 j7 s% R     
5 r% K5 [, F6 u; V  v    Network Protocols
2 V/ g, O6 F, G0 ~4 C# M/ W     
* }: z' y( \/ U7 |6 R, w% i    Smartphones use cell-phone network technology to send and receive data (such as phone calls, web browsing, file transfers, etc.). Developers classify this technology into generations. The first generation includes analog cell phone technology. Digital cell phones require more advanced protocols, which constitute the second generation. Between generation two and three, network engineers created protocols that are more advanced than generation two’s digital technology but not so innovative that they are a truly new generation. Developers refer to these protocols as generation 2.5. This generation includes several early smartphone protocols, some of which are still used today. " S, P8 h; F1 E$ s2 b' `" d8 m
     
* z% N+ Y$ T7 a9 V  ]9 A- j3 e    General Packet Radio Services (GPRS) is a wireless, packet-based communication service and until recently was the standard 2.5G protocol used in most smartphones. Unlike a circuit-switched voice connection, this is a packet-switched, "always on" connection that remains active as long as the phone is within range of the service. It allows smartphones to do things like run applications remotely over a network, interface with the Internet, participate in instant messenger sessions, act as a wireless modem for a computer and transmit and receive e-mails.
回复

使用道具 举报

 楼主| 发表于 2012-8-14 10:30:45 | 显示全部楼层

2012年大学英语六级快速阅读冲刺题(6)

Flexible Interfaces - r: Q  o1 K3 z, o& ^. n
     $ |& h( C# a9 [/ ?1 n! B2 c* q0 a0 j
    The core services on smartphones all tie in to the idea of a multi-purpose device that can effectively multitask. A user can watch a video clip, field a phone call, then return to the video clip after the call, all without closing each application. Or he or she can flip through the digital calendar and to-do list applications without interrupting the voice call. All of the data stored on the phone can be synchronized with outside applications or manipulated by third-party phone applications in any number of ways. www.examw.com) N0 r& \: u# p$ f
     8 I9 y0 X8 B. h: l
    Systems supported by smartphones include Bluetooth, a short-range, wireless radio service that allows phones to wirelessly link up with each other and with other nearby devices that support it. This includes things like printers, scanners, input devices, computers and headsets. Some varieties of Bluetooth only allow communication with one device at a time, but others allow simultaneous connection with multiple devices.
# `( x4 g- q3 b( q# b4 e     : q, R& ^" W3 [% o- Z# ]3 R
    Also included is data synchronization(同步), a phone that keeps track of your personal information, like appointments, to-do lists, addresses, and phone numbers, needs to be able to communicate with all of the other devices you use to keep track of those things. There are hundreds of possible platforms and applications you might use for this in the course of a day. If you want to keep all of this data in synchronization with what’s on your phone, then you generally have to look for a cell phone that speaks the languages of all of the devices and applications you use. Or you can go out and buy new applications that speak the language of your cell phone.
# @; ?+ O, g, Z     ( n$ ^' S+ `' q# Q/ m
    Then there is Open Mobile Alliance (OMA), a collaborative organization with the mission to "facilitate global user adoption of mobile data services by specifying market driven mobile service enablers that ensure service interoperability (互用性) across devices, geographies, service providers, operators, and networks, while allowing businesses to compete through innovation and differentiation". The OMA formed a Data Synchronization Working Group, which is continuing the work begun by the SyncML Initiative. SyncML is an open-standards project designed to eliminate the trouble of worrying about whether your PIM devices sync up with your phone and vice-versa. The project is designed so that any kind of data can be synchronized with any application on any piece of hardware, through any network, provided that they are all programmed to OMA standards. This includes synchronization over the Web, Bluetooth, mail protocols and TCP/IP networks. ) M* }! P  L) o: Y
     3 U5 n# m' z0 T: n* c
    SyncML allows data to be synchronized from a phone to PalmOS, Windows, Mac and Linux applications using Bluetooth, infrared (红外线), HTTP or a USB cable.
- R9 s4 W" q; e; ]+ T6 y     2 k2 B/ C, a/ {. L$ g/ L# ?
    The Future of Smartphones
& n" E5 A0 q  x: w/ V; R     . a5 ^, u, o% b8 l/ b
    Smartphones are getting thinner and cheaper, and as a result are entering the consumer market. For the past few years smartphones have been aimed at prosumers, or "professional consumers" (prosumers can also refer to "production consumers", or consumers who drive the design, production and alteration of a product). Prosumers are generally early adopters of products. They have disposable income and great enthusiasm for particular products or technologies. Smartphone developers find prosumers very useful when designing applications and hardware. As prosumers pick and choose the phones that offer the applications they want, developers can tweak designs and move towards mass production. Analysts predict that one billion smartphone handsets will be sold by 2011. ! x5 b6 C5 [! A: K1 }9 S* }% C# ?
     ! y9 B! j6 b" |4 B) C
    Perhaps the most challenging consideration for the future is security. Smartphones and PDAs are already popular among many corporate executives, who often use their phones to transmit confidential information. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In an evil twin attack, a hacker sets a server’s service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hacker’s server, information can be intercepted (截取) and security is compromised.
# G2 v4 Z4 l. [) Z4 A9 e1 g' {     
5 M$ J/ v: {" h* |* m    One downside to the openness and configurability of smartphones is that it also makes them susceptible to viruses. Hackers have written viruses that attack SymbianOS phones. The viruses can do things like turning off anti-virus software, locking the phone completely or deleting all applications stored on the phone. : \1 k1 B: I% U9 U) q
     www.Examw.com
9 F' Z5 N* O( u5 x4 X; `. s9 c    On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software. 1 p: l8 u5 N7 ]; S6 ~& Y+ |
     
6 H9 n8 P3 @+ _8 P2 o8 |8 n    The incredible diversity in smartphone hardware, software and network protocols restrain practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.
  r3 e0 F. R8 M( \     
) \$ h7 S2 J& T7 }1 Y( K  Q    With data transmission rates reaching fast speeds and the incorporation of WiFi (无线局域网) technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. It’s an idea that probably hasn’t found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape or size yet. The next generation smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet.
回复 支持 反对

使用道具 举报

 楼主| 发表于 2012-8-14 10:30:46 | 显示全部楼层

2012年大学英语六级快速阅读冲刺题(6)

1. According to the passage, what’s the difference between smartphones and traditional cell phones?
1 v$ D+ Z6 h+ R- N' V     . Y4 f2 _% v, s, L' E) w( S1 ~: U' q
    A) Traditional cell phones allow users to do things in their own ways.
6 _, {+ Q# c; j7 M     
5 b5 ~, m- h1 e" o, Z6 }    B) Smartphones allow users to do things in their own ways. : y6 E7 ?. z2 _9 t& i) d4 B8 c  A7 Z* s# q
     
! E4 a. x- ]- X: l9 J1 ~    C) Smartphones are more expensive than traditional phones. 8 q4 |: A( z6 u! t, H# X$ Z
     
7 ?7 h3 y/ K; H1 Z    D) Smartphones are cheaper than traditional cell phones. , b! E7 {4 `2 c. |
     
, z0 Y6 F  x' }7 ^4 t    2. What is the function of a smartphone today? 8 h" E7 l. l  D+ y+ u( g# D  x
     ( l# ^( O* W; P0 r# R6 L
    A) It is widely used as call receiver, PIM, and even a credit card.
9 ]" k; b6 |+ [  w, @& B$ C, S     , C" u" @" ~; X( H3 c: y
    B) It is widely used as call receiver, PIM, and even a retail store. 8 L3 N9 j7 F) }! n1 h3 G
     
+ `4 i% W0 P* z" d3 T    C) It is widely used as call receiver, PIM, and even a bank.
, e9 E5 w- |8 m/ p8 h; M" y$ L     
$ r0 C8 w) u# T. d/ g8 M# V    D) It is widely used as call receiver, PIM, and communication with computers. ( Q  c- F: e% N+ q9 w
     8 ]/ _; L5 y( |
    3. Protocols that are more advanced than generation 2’s digital technology but not so creative are        .
# Q1 h; q. }2 J4 r: X0 S, J" a     
+ }( A7 x2 v5 r/ V5 r( Z6 x, b    A) generation 2.5
4 v" l' J; }4 X1 `     
7 @) o' F: V' E9 K( B1 H1 ~    B) generation 3 ; s! @0 N5 ]  u# a8 Q& f
     + ~& m( a6 f6 q3 u# M
    C) generation between 1 and 2 8 \5 \; z" a( M( p/ [, {
     : l) j6 ]- t4 }( G: _% Y) w% d
    D) generation out of use 8 f+ {! |( L: }( i: ~! N
     转自:考试网 - [Examw.Com]
) h. c( h' |. \    4. What is said about the central services on smartphones? " T, [8 {6 j% ?) x. c5 j
     3 H% }$ i2 d$ p$ i) R: C3 L" t
    A) They make it possible for users to do many tasks at the same time. + s3 `: ~" p% D  w2 x
     
+ O6 e0 n8 [- ^$ ^    B) They permit users to do one task at one time. 0 _& N7 q3 P0 `# u& {: }! B' V
     
& R" o, w$ k+ ^6 ]9 X    C) They limit the uses of smart phones. * Y4 _% X0 \: f7 ^
     3 ~" q8 Q! u* h9 W6 J8 o  q
    D) They are changing from single task to multitask for the use of consumers. : \) g& E7 {/ [% x5 G1 ?) x! A
     8 Q8 }$ [4 u! [1 ]& c1 {
    5. If a smartphone and a nearby device both support Bluetooth, then the two        .
( W1 T- I" A1 R     . {& T3 n/ X; Z" a3 _0 Z) t7 Y
    A) can be wirelessly separated
+ }& g: t& W+ i& L- a8 P' w     . n7 [7 v4 \3 q0 I8 T
    B) ca be wirelessly linked up
3 o& g* U8 z  I" K! a1 Q     ) t% f4 b% |. d7 p2 `  X, `
    C) can be integrated by wire # H; U$ H% I% @8 Y0 p! a" ~
     7 F2 B) B- n' s: ?; C1 Y1 j1 n
    D) can be recombined by wire
6 F% w. I  v' t0 A: |     
' Z0 O8 x$ x: f# [& ]/ o. x4 ^    6. Owning to the Data Synchronization Working Group, the data on the phone can be easily synchronized with any applications        . % B% Q) O6 N6 q% d  `+ d, t
     3 T) s, C3 K6 K0 T
    A) if they are of SyncML Initiative : o$ y; ?: u! o
     
! _# ?7 l* ~  p) a- T8 y) \    B) if they are of PIM service 9 g& n7 O( |% L- E; h1 e6 w8 X/ l5 `
     " m( F5 ~1 `9 v( Z% h$ T
    C) if they are of TCP/IP networks   s$ J& N; h' U% Q0 a
     
' h; B8 G9 B4 t  l' D    D) if they are of OMA standards
* N& n/ z0 u0 H0 Q5 r3 [7 h* A8 {8 r( o     
$ m7 ]! o* d5 \    7. Prosumers, being choosers and early adopters of products, are helpful in directing the smartphone developers into
: Q! Q! f& E$ t+ I" s7 @, D4 n/ B9 Q     
  I7 z* q* X0 y2 r    A) smartphone sellers   y  n+ K! R) Z
     
- q3 S( }+ u, U& m4 D; |% e    B) smartphone users
1 M" [# d/ @( c: z3 J8 X* P     * `2 m  @5 S! P- x5 G, @, y* z
    C) mass production # F0 _, F5 S$ L7 T% M- F2 Z/ C% b" L
     : H2 W* ~$ @2 n; d0 [9 f! M
    D) market promoters
" M4 J/ \, X- R     
$ y- E" @+ z9 V+ f% |( _    8. Security of smartphones has to be given priority in the future because many executive use them to send __________________.
8 L% D9 U& @4 E( z, C5 p6 o7 h     ( `' U; f" P, W5 D. F
    9. Since feasible security measures are hard to apply to smartphones, security considerations are better turned to __________________.
+ J- c0 ~! y7 a: J# v     9 k) ]' d* r% {5 o. r, g- J+ t
    10. The perspectives for smartohones are limitless, and the next generation smartphone could be of any _______________.
回复 支持 反对

使用道具 举报

 楼主| 发表于 2012-8-14 10:30:47 | 显示全部楼层

2012年大学英语六级快速阅读冲刺题(6)

答案:文章梗概: " u* V. {% F. m2 j5 K2 ?
     ! w$ D* ^/ _1 s* T! R, u
    本文主要介绍了智能手机当前和未来的发展情况。文章第一个标题介绍了智能手机的特点和功能。第二个标题介绍了智能手机的几代网络协定技术,特别介绍了GPRS业务。第三个标题描述了智能手机灵活的界面操作及其支持的系统。第四个标题指出了智能手机的未来发展趋势及安全问题。
  @+ l- j$ r/ s( P+ M! p     8 |8 Y; L6 W2 D
    答案解析: + A- \8 ^% j' y0 T. R. ]. o* v
     
8 o* F3 M0 K9 a* y$ \: L1 s0 }! W9 H    1. 由题干关键词difference between smartphones and traditional cell phones定位至第一个小标题Basics of a Smartphone下第一段首句Unlike many traditional cell phones, smartphones allow individual users to install, configure and run applications of their choosing. 也就是说,智能手机与传统手机不同,它可以让个体使用者任意安装、设定和运行应用软件。另外该段最后一句也表达了这个意思,这些信息都说明选项B)正确,至于两种手机的价格文中没有提及。 . k" h$ U6 C: f
     + |! g# k9 G+ D- S) p" d
    2. 由题干关键词function定位至第一个小标题Basics of a Smartphone下第二段第二句和第三段第二句,前者证明了智能手机确实具有电话接收、个人信息管理以及与电脑交流功能;而第三段最后一句却指出Currently, it’s still in the trial phase of development. 这种带有信用卡功能的手机正在试验阶段。A)提到智能手机具有信用卡功能不对,故排除;B)和C)中的零售商店和银行功能文中并未提及,由此可知正确答案是D)。 # ]" o0 p2 {- g+ Z$ f! L
     - z0 N$ \0 T2 r) M# |+ h' m; f
    3. 由题干关键词protocals定位至第二个小标题Network Protocols下第一段的第五句和第六句Between generation two and three, network engineers created protocols that are more advanced than generation two’s digital technology but not so innovative that they are a truly new generation. Developers refer to these protocols as generation 2. 5.意思是说在第二和第三代智能手机之间,网络工程师们研制出比第二代数字技术更为先进的网络规程,但这套规程还不够创新成为第三代手机,开发商把这套规程成为第2.5代,因此答案A)与原文相符。 . ^  g* t) e; r; W: O: d7 t
     
, z- I5 G, U0 G( Y+ C4 a* P    4. 由题干关键词central services on smartpone定位至第三个小标题Flexible Interfaces下第一段第一句The core services on smartphones all tie in to the idea of a multi-purpose device that can effectively multitask.可知,智能手机的核心服务就是用这种多功能装置使用户能有效地做多件事情,因此答案A)正确。 : X5 R4 B  V2 R& K- e. n
     
& t1 w' m; N, S3 x+ _* K    5. 由题干关键词Bluetooth和wirelessly定位至第三个小标题Flexible Interfaces下第二段第一句Systems supported by smartphones include Bluetooth, a short range, wireless radio service that allows phones to wirelessly link up with each other and with other nearby devices that support it. 智能手机支持的系统包括蓝牙,一种短距离无线传输设备,可以把电话和附近支持蓝牙传输的其他设备无限连接起来。因此答案为B)。
# H$ v6 R* F( y1 Z3 M: Q- P     
5 }4 e; r- n) u7 M1 j    6. 由题干关键词Data Synchronization Working Group和synchronized with any applications定位至第三个小标题Flexible Interfaces下第四段倒数第二句。该句指出:这个项目是为了使任何种类的数据都能通过一切网络与任何硬件上的任何应用程序进行同步,只要他们的编程都符合OMA标准。故答案为D)。 - P9 Q9 s5 f1 t" q7 h" D" M) p4 z
     * L2 }& O* R) H# z. }" L4 h  q( k
    7. 由题干关键词Prosumers和helpful in directing the smartphone developers定位至第四个小标题The Future of Smartphones下第一段倒数第二句As prosumers pick and choose the phones that offer the applications they want, developers can tweak designs and move towards mass production. 专业消费者,或称参与生产的消费者挑选能够提供其所需应用软件的手机时,开发商根据他们的选择改进设计,转向大规模生产。故答案为C)mass production。 " G6 ~, c/ g* \* J! l' f
     
: K5 N1 q4 O+ s6 y! I" h    8. 由题干关键词Security和executives定位至第四个标题The Future of Smartphones下第二段前二句:未来要思考的最有挑战性的问题是安全性。智能手机和掌上电脑已经在很多公司主管中流行起来,他们经常用手机来发送机密信息。题干转述的就是这两句之间的因果关系,因此可以推出与空格部分对应的是confidential information。
5 `: \$ I; |3 T" y6 L     
/ T0 W/ b6 o+ q  ?1 H) |; N9 V( J4 N    9. 根据题文同序原则,由题干关键词security considerations 定位至第四个标题The Future of Smartphones下倒数第二段最后一句Most security considerations either focus on particular operating systems or have more to do with user behavior than network security. 安全性考虑应该侧重特定的操作系统或者更应注意使用者行为而非网络安全。由此可以总结出题干中要转述的内容是particular operating systems or user behavior。 " f' o* D! w6 H8 i, p7 y9 \$ m
     
/ l, \# Y9 E  u1 W    10. 由题干关键词next generation smartphone定位至第四个标题The Future of Smartphones下末段末句The next generation smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet. 下一代的智能手机可能看起来像翻盖手机、轻薄的个人电脑、一块糖或者人们还没有想到的什么东西。把这些归纳起来,显然答案为前面句子中的一个词组shape or size。
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-11-17 21:46 , Processed in 0.215148 second(s), 27 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表