2022海南自学考试考试模拟卷(4).docx
《2022海南自学考试考试模拟卷(4).docx》由会员分享,可在线阅读,更多相关《2022海南自学考试考试模拟卷(4).docx(22页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2022海南自学考试考试模拟卷(4)本卷共分为2大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共25题,每题2分。每题的备选项中,只有一个最符合题意) 1.Passage 2 If we were asked exactly what we were doing a year ago, we should probably have to say that we could not remember. But if we had kept a book and had written in it an account of what we did each da
2、y, we should be able to give an answer to the question. It is the same in history. Many things have been forgotten because we do not have any written account of them. Sometimes men did keep a record of the most important happenings in their country, but often it was destroyed by fire or in a war. So
3、metimes there was never any written record at all because the people of that time and place did not know how to write. For example, we know a good deal about the people who lived in China 4,000 years ago, because they could write and leave written records for those who lived after them. But we know
4、almost nothing about the people who lived even 200 years ago in central Africa, because they had not learned to write. Sometimes, of course, even if the people cannot write, they may know something of the past. For most people are proud to tell what their fathers did in the past. This we may call “r
5、emembered history”. Some of it has now been written down. It is not so exact or so valuable to us as written history is, because words are much more easily changed when used again and again in speech than when copied in writing. But where there are no written records, such spoken stories are often v
6、ery helpful.Which of the following ideas is not conveyed in the passageA “Remembered history”, compared with written history, is less reliable.BWritten records of the past plays a most important role in our learning of the human history.CA written account of our daily activities helps us to be able
7、to answer any questions.DWhere there are no written records, there is no history. 2.Passage 3 The advent of computers has brought with it a new set of opportunities for mischief (危害) and crime. Today, computers are easy to come by and many people know how computer technology works. More importantly,
8、 the growing use of computer networks can multiply a breach (破坏) of security, making larger numbers of people more vulnerable(脆弱的) than would be the case if they were using single, stand-alone computers. Whats more, computer experts agree that despite recent widespread publicity-computer viruses(病毒)
9、 are only one of many computer security problems facing the nation. The U.S. Defense Advanced Research Project Agency has requested that the Research Councils(委员会) Computer Science and Technology Board assess(评定) the security problems posed by computer technology, see what solutions may already exis
10、t, review research efforts aimed at avoiding security problem in the future, and evaluate existing policies relevant to computer security. The study committee will examine the issue of security for a broad spectrum of users, including the business, national security, and academic communities, as wel
11、l as the general public. David D.Clark, senior research scientist, Laboratory for Computer Science, Massachusetts Institute of Technology, will chair the committee of experts in electronic security, net work security, computer law, software engineering, cryptography(密码编制), and operating systems. The
12、 committee will also include computer users from the defense and banking industries.Which of the following is most likely to be agreed by computer expertsAComputers are easily available.BThere are many kinds of computer security problems.CComputer viruses are the only problem facing the computer net
13、work.DThe growing use of computer networks can multiply a breach of security. 3.Passage 2 If we were asked exactly what we were doing a year ago, we should probably have to say that we could not remember. But if we had kept a book and had written in it an account of what we did each day, we should b
14、e able to give an answer to the question. It is the same in history. Many things have been forgotten because we do not have any written account of them. Sometimes men did keep a record of the most important happenings in their country, but often it was destroyed by fire or in a war. Sometimes there
15、was never any written record at all because the people of that time and place did not know how to write. For example, we know a good deal about the people who lived in China 4,000 years ago, because they could write and leave written records for those who lived after them. But we know almost nothing
16、 about the people who lived even 200 years ago in central Africa, because they had not learned to write. Sometimes, of course, even if the people cannot write, they may know something of the past. For most people are proud to tell what their fathers did in the past. This we may call “remembered hist
17、ory”. Some of it has now been written down. It is not so exact or so valuable to us as written history is, because words are much more easily changed when used again and again in speech than when copied in writing. But where there are no written records, such spoken stories are often very helpful.We
18、 know very little about the central Africa 200 years ago because_.Athere was nothing worth being written down at that timeBthe people there ignored the importance of keeping a recordCthe written records were perhaps destroyed by a fireDthe people there had not known how to write 4.Passage 3 The adve
19、nt of computers has brought with it a new set of opportunities for mischief (危害) and crime. Today, computers are easy to come by and many people know how computer technology works. More importantly, the growing use of computer networks can multiply a breach (破坏) of security, making larger numbers of
20、 people more vulnerable(脆弱的) than would be the case if they were using single, stand-alone computers. Whats more, computer experts agree that despite recent widespread publicity-computer viruses(病毒) are only one of many computer security problems facing the nation. The U.S. Defense Advanced Research
21、 Project Agency has requested that the Research Councils(委员会) Computer Science and Technology Board assess(评定) the security problems posed by computer technology, see what solutions may already exist, review research efforts aimed at avoiding security problem in the future, and evaluate existing pol
22、icies relevant to computer security. The study committee will examine the issue of security for a broad spectrum of users, including the business, national security, and academic communities, as well as the general public. David D.Clark, senior research scientist, Laboratory for Computer Science, Ma
23、ssachusetts Institute of Technology, will chair the committee of experts in electronic security, net work security, computer law, software engineering, cryptography(密码编制), and operating systems. The committee will also include computer users from the defense and banking industries.The phrase “a broa
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2022 海南 自学考试 考试 模拟
限制150内