試卷征集
加入會(huì)員
操作視頻
當(dāng)前位置: 試卷中心 > 試卷詳情

2020年江蘇省揚(yáng)州中學(xué)高考英語(yǔ)模擬試卷(6月份)

發(fā)布:2024/4/20 14:35:0

第一部分 聽力(共兩節(jié),滿分5分)第一節(jié)(共5小題;每小題1分,滿分5分)聽下面5段對(duì)話.每段對(duì)話后有一個(gè)小題,從題中所給的A、B、C三個(gè)選項(xiàng)中選岀最佳選項(xiàng),并標(biāo)在試卷的相應(yīng)位置.

  • 1.What does the man suggest the woman do?
    A. Put up a notice.
    B. Search the canteen.
    C. Buy a new textbook.

    組卷:2引用:3難度:0.9
  • 2.Where does the man want to go?
    A.Beech St.
    B.East Main.
    C.Linden Ave.

    組卷:2引用:3難度:0.9
  • 3.How much time does the woman's watch gain?
    A. Ten minutes.
    B. Five minutes.
    C. Fifteen minutes.

    組卷:1引用:3難度:0.9
  • 4.Who is the man probably?
    A. A policeman.
    B. A gas station clerk.
    C. A driving coach.

    組卷:1引用:3難度:0.9
  • 5.What are the speakers mainly talking about?
    A.The nice weather.
    B.The strong wind.
    C.The beautiful leaves.

    組卷:3引用:8難度:0.9

第二節(jié)(共 15 小題;每小題 1 分,滿分 15 分)聽下面 5 段對(duì)話或獨(dú)白.每段對(duì)話或獨(dú)白后有幾個(gè)小題,從題中所給的 A、B、C 三個(gè)選項(xiàng)中選出最佳選項(xiàng),并標(biāo)在試卷的相應(yīng)位置.

  • 6.(1)Where does the woman's brother work?
    A.At the police station.
    B.In a small store.
    C.In a college.
    (2)How is the woman's relationship with her parents?
    A.Terrible.
    B.Just so-so.
    C.Good.

    組卷:1引用:4難度:0.9
  • 7.(1)Which team does the man support?
    A.The Reds.
    B.The Cubs.
    C.The Mets.
    (2)What does the woman say about the Cubs?
    A.They have a new base runner.
    B.They have a great record this year.
    C.They won every game this season.

    組卷:1引用:4難度:0.9
  • 8.(1)How old is the woman?
    A.25 years old.
    B.60 years old.
    C.70 years old.
    (2)What kind of shops does the woman never visit?
    A.Big chain stores.
    B.Small shops.
    C.Independent shops.
    (3)What is the woman's opinion about fashions?
    A.They never repeat.
    B.Jeans are the most fashionable.
    C.Some of them may return years later.

    組卷:1引用:4難度:0.9
  • 9.(1)What will the presentation start with?
    A.The different types of clouds.
    B.The formation of clouds.
    C.The functions of clouds.
    (2)Why does the man suggest having small cards?
    A.To make the presentation interesting.
    B.To remind him of what to say.
    C.To organize all the research.
    (3)What will the man do?
    A.Prepare the cards.
    B.Make the presentation slides.
    C.Look for pictures of clouds online.
    (4)What section will the woman talk about?
    A.The introduction.
    B.The low-level clouds.
    C.The medium-level clouds.

    組卷:1引用:4難度:0.9
  • 10.(1)What do we know about the Climbing Center?
    A.It was started in 1952 by a mountaineer.
    B.It runs courses from March to November.
    C.It doesn't provide accommodation in winter.
    (2)What does the speaker think of the price of the four-day course?
    A.Low.
    B.Reasonable.
    C.High.
    (3)What did the speaker learn to do on the second day?
    A.Predict the weather.
    B.Read a map.
    C.Set up a tent.
    (4)What can people enjoy in the evenings at the Center?
    A.Seeing films.
    B.Reading books.
    C.Playing table tennis.

    組卷:3引用:4難度:0.9

第 Ⅱ 卷(非選擇題, 兩部分, 共35分)第五部分:任務(wù)型閱讀(共1小題;每小題10分,滿分10分)請(qǐng)認(rèn)真閱讀下面的短文,并根據(jù)所讀內(nèi)容在文章后表格中的空格里填入一個(gè)最恰當(dāng)?shù)膯卧~.注意:請(qǐng)將答案寫在答題卷上相應(yīng)題號(hào)的橫線上,每個(gè)空格只填一個(gè)單詞.

  • 31.Could a Doodle (涂鴉)Replace Your Password? Nearly 80 percent of Americans own a smartphone,and a growing proportion of them use smartphones to surf the Internet,not just when they're on the go.This leads to people storing considerable amounts of personal and private data on their mobile devices.
        Often,there is just one layer of security protecting all that data--emails and text messages,social media profiles,bank accounts and credit cards,even other passwords to online services.It's the password that unlocks the smartphone's screen.Usually this involves entering a number,or just laying a fingertip on a sensor.
        Over the past couple of years,my research group,my colleagues and I have designed,created and tested a better way.We call it "user-generated free-form gestures," which means smartphone owners can draw their own security pattern on the screen.It's a very simple idea that is surprisingly secure.
        1.IMPROVING TODAY'S WEAK SECURITY
        It might seem that biometric (生物識(shí)別的) authentication (認(rèn)證),like a fingerprint,could be stronger.But it's not,because most systems that let a user allow fingerprint access also require a PIN (Personal Identification Number) or a password as a backup method.A user ─ or thief ─ could skip the biometric method and instead just enter (or guess) a PIN or a password.
        Compared to other methods,our approach dramatically increases the potential length and complexity of a password.Users simply draw a pattern across an entire touchscreen,using any number of locations on the screen.
        2.MEASURING DRAWINGS
        As users draw a shape or pattern on the screen,we track their fingers,recording the directions and speed.We compare that track to one recorded when they set up the gesture-based login.This protection can be added just by software changes;it needs no specific hardware or other modifications to existing touchscreen devices.As touchscreens become more common on laptop computers,this method could be used to protect them too.
        Our system also allows people to use more than one finger - though some participants wrongly assumed that making simple gestures with multiple fingers would be more secure than the same gesture with just one finger.The key to improving security using one or more fingers is to make a design that is not easy to guess.
        3.EASY TO DO AND REMEMBER,HARD TO BREAK
        Some people who participated in our studies created gestures that could be articulated as symbols,such as digits,geometric shapes (like a cylinder) and musical notations which are easy for them to remember.Even a relatively simple symbol,like an eighth note,can be drawn in so many different ways that calculating the possible variations is computationally intensive and consumes plenty of time.This is unlike text passwords,for which variations are simple to try out.
        4.REPLACING MORE THAN ONE PASSWORD
        Our research has extended beyond just using a gesture to unlock a smartphone.We have explored the potential for people to use doodles instead of passwords on several websites.It appeared to be easier to remember multiple gestures than it is to recall different passwords for each site.
        In fact,it was faster.Logging in with a gesture took two to six seconds less time than doing so with a text password.It's faster to generate a gesture than a password,too.People spent 42 percent less time generating gesture credentials than people we studied who had to make up new passwords.We also found that people could successfully enter gestures without spending as much attention on them as they had to with text passwords.
        Gesture-based interactions are popular and prevalent on mobile platforms,and are increasingly making their way to touchscreen-equipped laptops and desktops.The owners of those types of devices could benefit from a quick,easy and more secure authentication method like ours.
    Could a Doodle Replace Your Password?
    Passage outline Detailed information
    Introduction An increasing number of people use smartphones for Internet (1)
    The free-form gesture drawn with a doodle is a very simple but surprisingly secure idea.
    Characteristics Improving today's weak security. ●A user or thief could skip fingerprint authentication by employing an(2)
    like just guessing a PIN or a password.
    ●In (3)
    to other methods,the password of our approach is dramatically longer and complex than that of other methods.
    Measuring drawings ●A shape or pattern drawn on the screen,we track where the user's fingers go and (4)
    quickly they move.
    ●To make a design with one or more fingers that is difficult to guess is of great(5)
    to the improvement of security.
    Easy to do and remember,hard to break ●Even a relatively simple symbol can be drawn in diverse ways so that the(6)
    of the possible variations is intensive and time-consuming.
    (7)
    the place of more than one password
    ●It is more(8)
    to recall different password for each site than to remember multiple gestures.
    ●Having new passwords(9)
    takes 42 percent more time than generating gesture credentials with a doodle.
    Conclusion Gesture-based interactions are gaining (10)
    and are widely applied to touchscreen-equipped laptops and desktops.

    組卷:4引用:1難度:0.4

第五部分: 書面表達(dá)(滿分25 分)

  • 32.請(qǐng)認(rèn)真閱讀下面文字及圖表,并按照要求用英語(yǔ)寫一篇150詞左右的文章.
       As many as one in seven recent graduates in Britain may have cheated by using essay mills(論文工坊) during the last four years,according to a recent study.Essay mills,also known as "constrict cheating",refers to companies offering essay-writing services for a fee which is hard to spot since the essays are written by humans or even tailored.Some British universities have seen decline in transitional plagiarism(剿竊) but this is now being replaced by constrict cheating,figures show.
       Experts have warned that essay mills have become more common,not only in Britain,but also across the world in recent years,with labor being outsourced to unemployed university graduates in counties like Kenya,India and Pakistan.Dr.Irene,academician manager at Coventry University and vice president European Network for Academic Integrity,said these figures are just the tip of the iceberg since so many instances go unnoticed.She added that students are being "bombarded(轟炸)" with advertisements for essay mills on social media as well as on campus.
    菁優(yōu)網(wǎng)

    【寫作內(nèi)容】1.以大約30詞概括所給文字和圖表的內(nèi)容;
    2.簡(jiǎn)述"論文工坊"可能造成的影響(至少兩點(diǎn));
    3.就如何應(yīng)對(duì)"論文工坊",提出你的建議(至少兩點(diǎn)).
    【寫作要求】1.寫作過程中不能直接引用原文語(yǔ)句;
    2.作文中不能出現(xiàn)真實(shí)姓名和學(xué)校名稱;
    3.不必寫標(biāo)題.
    【評(píng)分標(biāo)準(zhǔn)】?jī)?nèi)容完整,語(yǔ)言規(guī)范,語(yǔ)篇連貫,詞數(shù)適當(dāng).

    組卷:8引用:1難度:0.9
APP開發(fā)者:深圳市菁優(yōu)智慧教育股份有限公司| 應(yīng)用名稱:菁優(yōu)網(wǎng) | 應(yīng)用版本:5.0.7 |隱私協(xié)議|第三方SDK|用戶服務(wù)條款
本網(wǎng)部分資源來(lái)源于會(huì)員上傳,除本網(wǎng)組織的資源外,版權(quán)歸原作者所有,如有侵犯版權(quán),請(qǐng)立刻和本網(wǎng)聯(lián)系并提供證據(jù),本網(wǎng)將在三個(gè)工作日內(nèi)改正