问答题According to a group called the Voices Foundation, everyone has a singing voice as well as a (1)____(speak) voice somewhere inside them. This, they say, should be (2) enc____ from an early age because it provides the best, and the cheapest, basis on wh

题目
问答题
According to a group called the Voices Foundation, everyone has a singing voice as well as a (1)____(speak) voice somewhere inside them. This, they say, should be (2) enc____ from an early age because it provides the best, and the cheapest, basis on which to build an understanding of music.  The teachings of the Hungarian (3)____(compose) Zoltan Kodaly are responsible for this idea. He observed that songs can become a key part of the relationship (4)____ a mother and her child almost from birth. This is (5) es____ true of traditional societies, including those of West Africa, where some small children are able to sing literally (6) hun____ of songs, all of which have been learnt by heart. However, many modern children first come to an understanding of music (7)____ they learn to play an instrument, and although some teaching of the theory of music is usually a part of this, their relationship with the music on the page is often a mechanical one.  The (8)____(believe) of the Voices Foundation is that a natural feeling for rhythm, harmony and musical structure, the very qualities we appreciate in the greatest musicians, can only be achieved through the (9)____(explore) of the music of the voice from the beginning of a person’s life. The foundation has, therefore, set itself the task of developing a singing-centred musical education (10) pro____ that could benefit junior pupils all over the world.

相似考题

2.The next time you try for a high-ranking post,you could let your possible boss listen to a recommending(推荐)phone call"made"by US President Ceorge W.Bush or British Prime Minister Tony Blair. Of course,neither of them could really do that for you--you would just"borrow"their voices. AT&T labs will start selling speech software that it says is so good at reproducing the sounds of a human voice that it can recreate voices and even bring the voices of long-dead famous people back to life. The software,which turns printed text into speech,makes it possible for a company to use recordings of a person′s voice to say things that the person never actually said. Possible customers for the software,which is priced in the thousands of dollars,includes telephone call centers,companies that make software that reads digital(数字的)files aloud,and makers of automated voice devices(装置).The advances raise several problems.Who,for example,owns the rights to a famous person′s voice?Some experts even believe that new contracts(合同)will be drawn that include voice-licensing clauses. "And although scientists say the technology is not yet good enough to commit fraud(假冒),would the synthesized(合成的)voices at last be able to trick people into thinking that they were getting phone calls or digital audio recordings from people they know? Even Mr Fruchterman,one of AT&T labs′possible first customers,said he wondered what the new technology might bring."Just like you can′t trust a photograph any more."he said,"you won′t be able to trust a voice either."If the speech software were widely used,A.people would no longer believe each other B.it would not be necessary to go for a speech by a famous person C.no radio or TV broadcasters would be needed D.recording of a voice alone would not be taken as a proof in the court

3.The next time you try for a high-ranking post,you could let your possible boss listen to a recommending(推荐)phone call"made"by US President Ceorge W.Bush or British Prime Minister Tony Blair. Of course,neither of them could really do that for you--you would just"borrow"their voices. AT&T labs will start selling speech software that it says is so good at reproducing the sounds of a human voice that it can recreate voices and even bring the voices of long-dead famous people back to life. The software,which turns printed text into speech,makes it possible for a company to use recordings of a person′s voice to say things that the person never actually said. Possible customers for the software,which is priced in the thousands of dollars,includes telephone call centers,companies that make software that reads digital(数字的)files aloud,and makers of automated voice devices(装置).The advances raise several problems.Who,for example,owns the rights to a famous person′s voice?Some experts even believe that new contracts(合同)will be drawn that include voice-licensing clauses. "And although scientists say the technology is not yet good enough to commit fraud(假冒),would the synthesized(合成的)voices at last be able to trick people into thinking that they were getting phone calls or digital audio recordings from people they know? Even Mr Fruchterman,one of AT&T labs′possible first customers,said he wondered what the new technology might bring."Just like you can′t trust a photograph any more."he said,"you won′t be able to trust a voice either."According to the passage,you can infer thatA.the software will turn out to be an immediate success in the market B.the government will forbid the sale of the software in the market C.it'shard to decide whether the software will enjoy popularity D.the software will soon prove to be nothing but rubbish

更多“问答题According to a group called the Voices Foundation, everyone has a singing voice as well as a (1)____(speak) voice somewhere inside them. This, they say, should be (2) enc____ from an early age because it provides the best, and the cheapest, basis on wh”相关问题
  • 第1题:

    The next time you try for a high-ranking post,you could let your possible boss listen to a recommending(推荐)phone call"made"by US President Ceorge W.Bush or British Prime Minister Tony Blair.
    Of course,neither of them could really do that for you--you would just"borrow"their voices.
    AT&T labs will start selling speech software that it says is so good at reproducing the sounds of a human voice that it can recreate voices and even bring the voices of long-dead famous people back to life.
    The software,which turns printed text into speech,makes it possible for a company to use recordings of a person′s voice to say things that the person never actually said.
    Possible customers for the software,which is priced in the thousands of dollars,includes telephone call centers,companies that make software that reads digital(数字的)files aloud,and makers of automated voice devices(装置).The advances raise several problems.Who,for example,owns the rights to a famous person′s voice?Some experts even believe that new contracts(合同)will be drawn that include voice-licensing clauses.
    "And although scientists say the technology is not yet good enough to commit fraud(假冒),would the synthesized(合成的)voices at last be able to trick people into thinking that they were getting phone calls or digital audio recordings from people they know?
    Even Mr Fruchterman,one of AT&T labs′possible first customers,said he wondered what the new technology might bring."Just like you can′t trust a photograph any more."he said,"you won′t be able to trust a voice either."

    With the help of the speech software it is most possible

    A.to improve a famous person's speech
    B.to say what you want in another's voice
    C.to make a speech much more easily
    D.to help you to find a better job

    答案:D
    解析:
    考情点拨:事实细节题。应试指导:从第一段可知答案为D。

  • 第2题:

    Listen! Who()in the next room? The voice is so beautiful.

    • A、sings
    • B、sang
    • C、has sung
    • D、is singing

    正确答案:D

  • 第3题:

    Which two statements are true about the protocols that are used for transmitting voice traffic?()

    • A、RTP multiplexing is used to keep multiple phone conversations separate
    • B、RTP provides end-to-end delivery services for voice traffic
    • C、UDP is used to ensure a reliable transmission from sender to receiver
    • D、RTP is used to provide resource reservation for the voice stream
    • E、UDP provides multiplexing

    正确答案:E

  • 第4题:

    Which two pairings match the application with the correct Cos value?()

    • A、CoS 0 = Best-Effort Data
    • B、CoS 1 = Best-Effort Data
    • C、CoS 3 = High Priority
    • D、CoS 4 = High Priority Data
    • E、CoS 5 = Voice Bearer
    • F、CoS 7 = Voice Bearer

    正确答案:A,E

  • 第5题:

    Which two statements are true about voice VLANs?()

    • A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
    • B、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
    • C、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
    • D、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
    • E、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
    • F、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

    正确答案:C,D

  • 第6题:

    Why is QoS important in a converged network?()

    • A、Because data does not need to arrive intact, so data transfer rates can be variable
    • B、Because lost voice-data packets must be retransmitted
    • C、Because voice data packets should arrive quickly and sequentially, and with no lost data
    • D、Because voice data packets must follow a single dedicated path through the network

    正确答案:C

  • 第7题:

    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

    • A、requires access lists to identify the voice traffic 
    • B、can allow traffic from a device without 802.1X authentication, by MAC address
    • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
    • D、allows all packets marked with a ToS of 5 to bypass authentication
    • E、allows all IP voice packets to bypass authentication via stateful inspection

    正确答案:B,C

  • 第8题:

    Consider the following command to add a new disk group called "tdgroupA" with two failover groups: CREATE DISKGROUP tdgroupA NORMAL REDUNDANCY FAILOVERGROUP control01 DISK ’/devices/A1’,  ’/devices/A2’,  ’/devices/A3’  FAILOVERGROUP control02 DISK ’/devices/B1’,  ’/devices/B2’,  ’/devices/B3’m  The disk "/devices/A1" is currently a member disk of a disk group by the name "tdgroup1".  Which task would be accomplished by the command?()

    • A、 This command would result in an error because a disk group can have only one failover group.
    • B、 This command would result in an error because the /devices/A1 disk is a member of another disk group tdgroup1.
    • C、 A new disk group called tdgroupA will be added with two failover groups and the /devices/A1 disk will get reattached to the new disk group without being detached from the existing one.
    • D、 A new disk group called tdgroupA will be added with two failover groups and the /devices/A1 disk will be ignored for the new disk group because it is a member of an existing disk group tdgroup1.
    • E、 A new disk group called tdgroupA will be added with two failover groups and the /devices/A1 disk gets detached from the existing disk group tdgroup1 and attached to the new disk group tdgroupA

    正确答案:B

  • 第9题:

    单选题
    Listen! Who()in the next room? The voice is so beautiful.
    A

    sings

    B

    sang

    C

    has sung

    D

    is singing


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A customer indicates their teleworkers plan to use IP phones in their home offices. The IT department has surveyed the planned teleworkers, resulting in the user groupings shown in the exhibit. To provide the highest voice quality, the best recommendations to this customer are().
    A

    Deploy all three groups with a QoS service policy, choosing the parameters for Traffic Shaping based on the average uplink speed across the three groups.

    B

    Teleworkers in Groups A and B should inquire with their DSL providers for subscriptions with higher uplink bandwidths.

    C

    Teleworkers in Group C should change their subscriptions to DSL for deployment consistency.

    D

    Teleworkers in Group A should upgrade their subscription to obtain static IP addresses

    E

    Teleworkers in Group A should inquire with their DSL providers for subscriptions with higher downlink bandwidths.


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    问答题
    According to a group called the Voices Foundation, everyone has a singing voice as well as a (1)____(speak) voice somewhere inside them. This, they say, should be (2) enc____ from an early age because it provides the best, and the cheapest, basis on which to build an understanding of music.  The teachings of the Hungarian (3)____(compose) Zoltan Kodaly are responsible for this idea. He observed that songs can become a key part of the relationship (4)____ a mother and her child almost from birth. This is (5) es____ true of traditional societies, including those of West Africa, where some small children are able to sing literally (6) hun____ of songs, all of which have been learnt by heart. However, many modern children first come to an understanding of music (7)____ they learn to play an instrument, and although some teaching of the theory of music is usually a part of this, their relationship with the music on the page is often a mechanical one.  The (8)____(believe) of the Voices Foundation is that a natural feeling for rhythm, harmony and musical structure, the very qualities we appreciate in the greatest musicians, can only be achieved through the (9)____(explore) of the music of the voice from the beginning of a person’s life. The foundation has, therefore, set itself the task of developing a singing-centred musical education (10) pro____ that could benefit junior pupils all over the world.

    正确答案: 1.speaking as well as和…一样,连接两个并列结构,所以要用a speaking voice与a singing voice相对应。speaking为现在分词形式作形容词用。
    2.encouraged 句意:他们认为,the singing voice可以为建立对音乐的理解提供最好最省事的基础,因此从一开始就应该鼓励并提倡孩子发展他们的singing voice。
    3.composer Zoltan Kodaly(高大宜)是匈牙利著名的作曲家、民族音乐学家及音乐教育家。composer(作曲家)作Zoltan Kodaly的同位语,表明他的身份。Hungarian匈牙利的。
    4.between the relationship between…and……和…之间的关系。between…and在…之间,固定搭配。
    5.especially 从下文西非国家孩子与现代社会孩子在对音乐的了解方面所形成的鲜明对比中可以看出上文Zoltan Kodaly提出的歌曲是母子之间关系的关键部分的观点在传统社会中尤其正确。especially尤其地,特别地。
    6.hundreds hundreds of数百,几百。
    7.when 此处为when引导的时间状语从句。
    8.belief 此空作句子主语,且前面有定冠词修饰,所以要用believe的名词形式belief。
    9.exploration 此空作be achieved through的宾语,并且从of所有格和定冠词the的使用中都可以看出此处应填名词形式。exploration探索,探究。
    10.program(me) program(me) 规划,打算,节目。
    解析: 暂无解析

  • 第12题:

    单选题
    Of the two lectures, the first was by far the best one, partly because the person who delivered it had such a pleasant voice.
    A

    the first

    B

    the best

    C

    it

    D

    such a


    正确答案: B
    解析:

  • 第13题:

    Listen! Who()in the next room? The voice is so beautiful.

    Asings

    Bsang

    Chas sung

    Dis singing


    D

  • 第14题:

    Which three statements are true about the data traffic characteristics of voice traffic? ()

    • A、latency must be kept below 150 ms
    • B、latency is not a concern as long as jitter is kept below 30 ms
    • C、voice packets do not require a specific type of queuing
    • D、voice packets are rather small
    • E、voice packets require TCP for rapid retransmission of dropped packets
    • F、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

    正确答案:A,D,F

  • 第15题:

    What advantage does integrated messaging have over standard voice-mail systems?()

    • A、provides text versions of your voice-mail messages
    • B、forwards voice-mail messages to your email at .wav files
    • C、provides a toolbar to see the status of coworkers
    • D、eliminates the need for a live operator to answer the phone

    正确答案:B

  • 第16题:

    Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()

    • A、 gold, silver, bronze, and platinum
    • B、 platinum, gold, silver, and bronze
    • C、 titanium, gold, silver, and bronze
    • D、 voice and video, best effort, background, and scavenger
    • E、 voice, video, best effort, and background
    • F、 voice, video, best effort, and scavenger

    正确答案:E

  • 第17题:

    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()

    • A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  
    • B、 Voice traffic data flow involves large volumes of large packets.  
    • C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  
    • D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. 
    • E、 Voice packets are very sensitive to delay and jitter. 

    正确答案:A,E

  • 第18题:

    When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

    • A、 platinum, gold, silver, and bronze
    • B、 voice, gold, silver, and bronze
    • C、 low delay, network critical, business, best effort
    • D、 voice, video, background gold, background silver, and best effort
    • E、 voice, video, best effort, and background
    • F、 voice, video, best effort, background, and scavenger

    正确答案:A

  • 第19题:

    Which two statements are true about the protocols that are used for transmitting voice traffic?()

    • A、RTP multiplexing is used to keep multiple phone conversations separate
    • B、RTP provides end-to-end delivery services for voice traffic.
    • C、UDP is used to ensure a reliable transmission from sender to receiver.
    • D、RTP is used to provide resource reservation for the voice stream.
    • E、UDP provides multiplexing of multiple phone conversations.

    正确答案:B,E

  • 第20题:

    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. TestKing.com has its headquarters in Chicago and branchoffices in Dallas and Miami. There is an Active Directory for every office namely:* Chicago office - SiteC* Dallas office - SiteD* Miami office - SiteM You are in the process of deploying Exchange Server 2010 servers in SiteC. In the near future you plan todeploy Exchange Server 2010 in SiteD as well as SiteM. During the course of the day you receive aninstruction from the CIO to propose a solution that will connect the Exchange Server 2010 servers to theExchange Server 2003 servers whilst ensuring that: * The e-mail messages that come from the Exchange Server 2010 server mailboxes to the ExchangeServer 2003 server mailboxes should come from a server in SiteD. * The e-mail messages that come from the Exchange Server 2010 server mailboxes to the ExchangeServer 2003 server mailboxes should come from a server in SiteC. What should you do?()

    • A、Test best option would be to set up an X400 connector to SiteC as well as changing the cost value for the original routing group connector.
    • B、Test best option would be to set up a new routing group connector as well as changing the default routing group connector.
    • C、Test best option would be to combine the Exchange Server 2003 servers and Exchange Server 2010 servers into one routing group.
    • D、Test best option would be to set up one Active Directory SMTP site link as well as two SMTP connections.

    正确答案:B

  • 第21题:

    多选题
    Which two pairings match the application with the correct Cos value?()
    A

    CoS 0 = Best-Effort Data

    B

    CoS 1 = Best-Effort Data

    C

    CoS 3 = High Priority

    D

    CoS 4 = High Priority Data

    E

    CoS 5 = Voice Bearer

    F

    CoS 7 = Voice Bearer


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
    A

    requires access lists to identify the voice traffic

    B

    can allow traffic from a device without 802.1X authentication, by MAC address

    C

    can allow traffic from Cisco IP phones by listening to their CDP advertisements

    D

    allows all packets marked with a ToS of 5 to bypass authentication

    E

    allows all IP voice packets to bypass authentication via stateful inspection


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
    A

     gold, silver, bronze, and platinum

    B

     platinum, gold, silver, and bronze

    C

     titanium, gold, silver, and bronze

    D

     voice and video, best effort, background, and scavenger

    E

     voice, video, best effort, and background

    F

     voice, video, best effort, and scavenger


    正确答案: F
    解析: 暂无解析

  • 第24题:

    单选题
    When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
    A

     platinum, gold, silver, and bronze

    B

     voice, gold, silver, and bronze

    C

     low delay, network critical, business, best effort

    D

     voice, video, background gold, background silver, and best effort

    E

     voice, video, best effort, and background

    F

     voice, video, best effort, background, and scavenger


    正确答案: B
    解析: 暂无解析