USB Desin by Example11 Moving a lot of data
小学上册第15次英语第5单元寒假试卷

小学上册英语第5单元寒假试卷英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1.What do we call the act of moving from one place to another?A. TravelB. TransportC. MigrationD. CommuteC2. A ______ (生态友好的) approach benefits the planet.3.I have a collection of toy _____ from various places.4. A ____ has a fluffy coat and loves to roll in the grass.5.The _____ (strawberry) is sweet.6.My cousin is a good __________ (演讲者) and speaks clearly.7.The _______ is important for pollination and growth.8.I we ar a coat when it’s ______ (寒冷).9.What do we call the written record of a person's life?A. BiographyB. AutobiographyC. NovelD. MemoirA10.The ________ was a famous explorer who sailed around the world.11.The Doppler effect changes the frequency of a wave as the source moves ______.12.The _______ (The Enlightenment) influenced modern democratic ideals and governance.13.What do you call a baby elephant?A. CalfB. PupC. FoalD. KidA14.She likes to ________ books in the library.15.The chemical symbol for yttrium is ______.16.Where do fish live?A. TreesB. WaterC. LandD. SkyB17.My sister, ______ (我姐姐), is learning to dance.18.What is the name of the famous American singer known for his hit song "Born to Run"?A. Bruce SpringsteenB. Bob DylanC. Elton JohnD. David BowieA Bruce Springsteen19.We have a ______ (丰富的) resource center.20.My favorite _____ is a red fire truck.21.He is a scientist, ______ (他是一名科学家), researching ecosystems.22.training session) builds capacity. The ____23.The ______ (触感) of leaves can vary widely.24.ssance was a period of great ______ (艺术) and learning in Europe. The Rena25.We should respect all _____ (自然环境).26.I believe that everyone should have the opportunity to express their __________.27.I enjoy ________ (画画) in my free time.28.What do you call a young crocodile?A. HatchlingB. PupC. CalfD. KitA29. A _____ (鲸鱼) can sing songs underwater.30.The _____ (carnation) is a popular flower.31.The ______ (小鹿) grazes quietly in the golden ______ (阳光).32.How many moons does Mars have?A. 1B. 2C. 3D. 433.What do we call a young seal?A. PupB. CubC. KidD. Calf34.The __________ can provide critical insights into the health of the environment.35. A _______ is a negatively charged ion.36.ic sank on its maiden voyage in ______ (1912年). The Tita37.What do we call the time of year when flowers bloom?A. WinterB. SpringC. SummerD. Autumn38.The __________ was an important event in the history of Europe. (工业革命)39.What do we call a person who studies the relationships between organisms in their environment?A. EcologistB. BiologistC. ChemistD. GeologistA40. A polymer is a large molecule made of repeating ______.41.I enjoy visiting ______ (动物园) to learn about conservation efforts.42.The hawk is a _________ bird of prey. (强壮的)43.The movement of tectonic plates can create ______ and valleys.44.What is the capital of Zimbabwe?A. HarareB. BulawayoC. MutareD. GweruA45.What do you call a book of maps?A. EncyclopediaB. AtlasC. DictionaryD. Almanac46.What is the name of the holiday in February?A. HalloweenB. Valentine's DayC. ChristmasD. New YearB47. A hamster enjoys running on its ______ (轮子).48.What is the name of the famous wall in China?A. Great Wall of ChinaB. Berlin WallC. Hadrian's WallD. Walls of TroyA49.Bees help pollinate ______.50. A ______ (猫) likes to sit in sunny spots.51. A _______ is a solid that forms during a chemical reaction in solution.52.Understanding the basics of plant care can lead to a successful ______. (了解植物护理的基本知识可以导致成功的园艺。
河南省周口市鹿邑县2023-2024学年高一下学期6月月考英语试题

河南省周口市鹿邑县2023-2024学年高一下学期6月月考英语试题一、阅读理解Four Must-Read Environmental BooksOur recommended list of environmental books covers a broad range of topics. The four must-read environmental books are sure to attract the greenest bookworms.Braiding SweetgrassBraiding Sweetgrass by Robin Wall Kimmer looks at the relationship between humans and the land. Kimmer ties lessons she learned to Western society’s view of plants and aims to tell the importance of plants and animals. The book also explores the lessons we may learn from plants and animals and how they relate to certain stories. Braiding Sweetgrass won the 2014 Sigurd F. Olson Nature Writing Award.The End of NatureThe End of Nature was published in 1989. Its author, Bill Mckibben, describes the relationship between nature and humans. It expresses the thought that nature was previously independent of humans but now has been affected by them in every way. The book tells the ideas of nature and the value it has lost.Silent SpringWritten by Rachel Carson,Silent Spring has been described as a landmark work of environmental writing and is praised for bringing the environment al movement into the public’s focus. The book stresses the effects of pesticides (杀虫剂) on the environment. The book eventually led to a change in the pesticide law of the US.The Sixth ExtinctionThe Sixth Extinction by Elizabeth Kolbert describes previous mass extinction events and connects them to many extinctions presently taking place. Kolbert studies the relationships humans have with the environment and finds that we are in the midst of the sixth mass extinction caused by humans. The Sixth Extinction won the 2015 Pulitzer Prize for General Non-Fiction. 1.Whose book focuses on nature’s lost value due to human activities?A.Robin Wall Kimmer’s.B.Rachel Carson’s.C.Bill Mckibben’s.D.Elizabeth Kolbert’s.2.Why is Silent Spring so important?A.It has reduced the use of land.B.It has affected a law in the US.C.It has changed people’s view of plants.D.It has prevented nature from beingindependent.3.What do Braiding Sweetgrass and The Sixth Extinction have in common?A.They won a prize.B.They focus on the lessons we learn.C.They are about mass extinction events.D.They view nature to be independent of humans.Ma Xiaohui, a famous Chinese erhu performer, held a concert in New York City earlier this month. The concert began with an overture (序曲) titled Legend of the Silk Road, and then came the theme song from the movie Crouching Tiger, Hidden Dragon, which beautifully celebrated the classic dialogue between erhu and cello (大提琴).“This beautiful and inspiring concert wonderfully mixed classical, Chinese and cross-cultural themes. It was a feast for the ears and souls. The performance was full of creativity centered around Ma’s mastery of the instrument.” says artist Ranjit Bhatnagar.“As a guitarist, I had the honor to perform with Ma,” says Tim Kelly. “Her powerful, moving melodies (旋律) inspired both me and the audience. It seems that in her hands, the instrument can touch the heart of every listener.”Influenced by the lively atmosphere, the 2023 World Madam Global Overall Champion, Sepideh Behboudi, danced to the music many times with his partner Ethan Rimes and other audience.Ma says music is an international language, and national musical instruments have their own unique characteristics. Using them as messengers, they can spread melodies of truth, goodness and beauty to all. She expresses a hope that the world can feel the charm of Chinese culture, the spiritual beauty of Chinese art and the warmth of the erhu to touch hearts.According to Ma, her tour was not limited to just music, but also brought a healingexperience to the audience. Ma with the Middle Tennessee State University Symphony performed the erhu concerto (协奏曲) Tianshan Shepherdess, as if bringing the audience to the foot of the Tianshan Mountains to see the blue sky, white clouds and the carefree shepherd.4.Who performed music with Ma Xiaohui?A.Sepideh Behboudi.B.Ethan Rimes.C.Tim Kelly.D.Ranjit Bhatnagar.5.What does the underlined word “they” in paragraph 5refer to?A.The audience.B.Unique characteristics.C.International languages.D.National musical instruments.6.What does Ma expect of her music tour?A.It can make her rich.B.It can help her with further study.C.It can spread Chinese culture and art.D.It can give her a chance to be a master. 7.Which words can best describe Ma’s Tianshan Shepherdess?A.Serious and tiring.B.Natural and relaxing.C.Traditional and loud.D.Fast and sad.A Japanese candy company has been making national news headlines for its idea to produce gummy candy (软糖) that tastes like an “imaginary fruit” called Kiraspika.Last year was a great one for gummy candy producers, and the market continued to expand throughout 2023, with fruit-flavored (水果味的) gummies being the most popular. There are plenty of fruit flavors to choose from, but companies are still limited to the fruits that can be found in our world. However, what if someone started making candy that tastes like imaginary fruits? That was the strange idea that a Japanese sweets maker recently came up with. Two months ago, the company created a new type of gummy candy that tastes like fruit “Kiraspika no Mi”, an imaginary fruit with an original flavor, design, and even a story.According to the story, the star-shaped Kiraspika only grows in the mountainous area of Blue Knife, where temperatures drop to —50℃ in winter. It is very difficult to get. Everything about Kiraspika was invented in the fruit lab where its flavor experts mixed various existing flavors to create a totally original one that tastes like nothing you’ve ever eaten.According to its designers, the Kiraspika-flavored gummy candy has a unique sweetnessmixed with a kind of sourness (酸味), but many of those who have tried it have their own description of the taste.To some, the Kiraspika flavor can be compared to that of an energy drink, while others say it tastes a bit like a spicy apple. It is the mystery of the flavor and the personal explanations that make this product liked by many people.8.What does the underlined word “expand” in paragraph 2 mean?A.Disappear.B.Shorten.C.Struggle.D.Grow.9.What is a feature of Kiraspika?A.It can’t be found in real life.B.It grows on the plain.C.It can be planted easily.D.It needs high temperatures.10.What makes the new type of gummy candy popular?A.Its shape.B.Its taste.C.Its origin.D.Its designer. 11.Where does this text probably come from?A.A news report.B.A health magazine.C.A biology book.D.An old story.Leif Richardson, who is a conservation biologist, and I are out with the goal of piecing together a picture of where wild bees live, and which species are in trouble in the home range of a native bee called Crotch’s bumble bee (大黄蜂). That bee is protected by the state law, and it’s one of the many species under survey.Our journey began at the foot of a mountain in Leo Carrillo State Park. It was a cloudy morning. We set off for a short hike, armed with bee nets and a cooler to cool any bees we would catch. It’s a harmless way to temporarily calm the bees, and to allow for more careful study and photos.Just a minute later, as Richardson walked into a meadow (草地), I heard him scream, followed by a snake! He stood there frozen for a moment before backing away towards the path, and then the snake went away.We were a little more careful with the possibilities then, as we prepared to catch our first bees. They were not hard to find—I could hear them buzzing everywhere, and soon Richardson said it was time for me to catch one.He told me to pinch (捏住) the tip of my net and held it upright, while slowly lowering it over a flower where our bumble bee was standing. As soon as the bee realized what was going on, it buzzed furiously inside my net, and then slowly climbed up the net towards the tip right where my finger was.It all seemed like a high possibility to get stung (被蜇). But Richardson assured me I would be fine. He had some advice for holding it. “You’re going to pinch harder than you think you need to, but not so hard that you hurt the bee.” As my fingertips got closer to the bee, it felt like I could hear it buzzing louder and louder. Richardson performed this whole process in seconds. For me, on the other hand, it was a nervous act of much concentration. But it paid off—and soon, I got my very first bee!12.What did Richardson come across on the way?A.A sudden rain.B.A snake.C.A bee net.D.A cooler. 13.What is paragraph 5mainly about?A.The process of bee-catching.B.The present situation of bumble bees.C.The challenge of finding a bumble bee.D.The purpose of studying bumble bees. 14.What can we know about Richardson’s bee catching?A.He failed.B.He got stung.C.He was nervous.D.He was professional. 15.What is the best title for the text?A.A Love of Nature B.A New Law for Bumble BeeC.An Outing for Bumble Bee D.A Trip to Leo Carrillo State ParkCultural tourism is a form of travel that focuses on exploring and experiencing the cultural heritage and traditions of a particular destination. Cultural tourism is a good way to enrich your experience as a tourist. 16 .Cultural tourism helps to encourage the protection of culture and heritage by keeping endangered traditions alive. For example, heritage handicraft skills (手工技能) might be little practical, but outside interest could be enough to safeguard a tradition that might otherwise have been lost.Cultural tourism also improves education. 17 , such as workshops, language lessons, or historical tours. They can learn about the traditions and customs of different cultures, and enrichtheir knowledge and experiences.However, when cultural practices and traditions are presented only for tourism purposes, they may lose their true meaning and become superficial (表面的) performances aimed at entertaining tourists. 18 .In addition, a lot of tourists can put a pressure on local resources. 19 , which leads to overcrowding, too much pollution and damage to historical sites.Most importantly, cultural tourism may lead to the loss of cultural diversity. As destinations become more popular to mass tourism, there is a risk of homogenization, where cultural practices and traditions become standardized to the tastes and expectations of tourists.20 , can the benefits outweigh the downsides.A.Only when culture tourism is managed properlyB.This can lead to a misunderstanding of the cultureC.It is important to improve cultural understanding and respectD.Because cultural tourism often involves travelling to far areasE.Travelers have the chance to take part in educational activitiesF.But it’s worth noting that this type of travel has both benefits and downsidesG.Popular cultural destinations often experience an increase in the number of visitors二、完形填空I am a Russian girl, and it has always been my small dream to climb to the top of a mountain to enjoy the sunrise since my childhood. However, there are no big 21 in my hometown, which makes me very 22 .After coming to China, I heard that there was Mount Huashan. I 23 to climb it to meet the beautiful dawn (黎明) at the top of the peak. On arriving at the foot of the mountain, I began climbing immediately with great 24 and determination.During the process, a sudden 25 made the stone floor wet and slippery. I had the idea of 26 , but the crowd encouraged me to continue the 27 . As the steps became 28 , everyone lined up, caught the chains and 29 moved forward. When I got close to the top of the mountain, I had nearly run out of 30 , so I found a place to rest for a while.Then I heard a voice saying, “Relax, and don’t be afraid. As long as you climb up, you are the best!” Hearing that, I realized if I was frightened by the 31 just now, I could not be the best. So I gathered all the 32 and finally made it!At the moment of 33 , the rolling sea of clouds and the amazing scenery on the mountain changed obviously. I truly 34 that life is like climbing up a mountain. Only with all the way of sweat and the confidence can you reach the top to enjoy a 35 life. 21.A.beaches B.lakes C.mountains D.forests 22.A.excited B.sad C.curious D.confident 23.A.regretted B.decided C.refused D.agreed 24.A.joy B.trouble C.pity D.attention 25.A.wind B.fog C.volcano D.rain 26.A.turning up B.giving up C.showing off D.standing out 27.A.trip B.story C.study D.writing 28.A.larger B.flatter C.narrower D.easier 29.A.slowly B.obviously C.currently D.hurriedly 30.A.strength B.chance C.paper D.water 31.A.reaction B.answer C.result D.difficulty 32.A.luck B.courage C.money D.hope 33.A.communication B.rest C.relief D.sunrise 34.A.understood B.doubted C.imagined D.complained 35.A.busier B.darker C.brighter D.sharper三、语法填空阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式。
the internet of things英语阅读理解

the internet of things英语阅读理解阅读短文,回答1-3题。
The Internet of Things(IoT) (物联网) aims to get everything and everyone talking. Attaching sensors to “things”,such as cows, cars and refrigerator, and then assigning them unique IP addresses allow them to “talk” to the Internet. Of course, the loT will involve much more than a handful of sensors. Networking company Cisco estimates that 50 billion Internet-connected devices and objects will be sending over data by 2020.1.How do researchers get everything and everyone talking?A.By establishing the loT and launching a handful of sensors.B.By connecting sensors with them and appointing them unique IP addresses.C.By communicating with them all the time through the IoT.D.By sending people to track them day and night and collect useful data.2.What else do critics worry about the loT besides its probablyending up being a fashion?A.People will lose interest in it as quickly as the thrill over last year's smartphone.B.Refrigerators and washing machines will be replaced by other devices in a few years.C.Whether related companies will provide long-term software updates or not.D.The software provided by companies will be outdated easily and quickly.3.According to the passage,when owners of the Telsa Model S electric received a recall notice, they __________________.A.just waited in the car while the maintenance is being done through wireless update.B.were required to go to the nearest 4S store to make some adjustments or repairs.C.could definitely depend on the loT to send them the charger plug to be fixed.D.had to confirm the update with the help of the equipment provided by the company.【答案】1-3 BCA.。
A DRYING DEVICE

专利名称:A DRYING DEVICE 发明人:Plestenjak, Joze申请号:EP98911351.9申请日:19980330公开号:EP1029211A1公开日:20000823专利内容由知识产权出版社提供摘要:the object of the invention, desiccator, which has sidewalls (11, 12,13) and a base (101) and a roof (100) hat\u00e1roltsz\u00e1r\u00edt\u00f3kamr\u00e1j\u00e1ban (1) l\u00e9gmozgat\u00f3 unit (40), and at least egyventil\u00e1tor (41) is arranged, and a sz\u00e1r\u00edt\u00f3berendez\u00e9sbenlegal\u00e1bb, tree. y of fodder for drying material to accommodate different szolg\u00e1l\u00f3rakat\u00e1llv\u00e1nyt hostsz\u00e1r\u00edt\u00f3t\u00e9r (6) is arranged.andasz\u00e1r\u00edt\u00f3kamr\u00e1ban (1) to (6) above thesz\u00e1r\u00edt\u00f3t\u00e9r spoiler (3) is arranged, and thesz\u00e1r\u00edt\u00f3kamr\u00e1j\u00e1nak desiccator (1) ajt\u00f3szer\u0171en also elrendezhet\u0151 oldalfal\u00e1ban (11)kialak\u00edtottszell\u0151z\u0151ny\u00edl\u00e1sban pillang\u00f3lemez (111) which is arranged z\u00e1rthelyzet\u00e9 in the sz\u00e1r\u00edt\u00f3kamra (1) top (100), the spoiler (3), and a pillang\u00f3lemez (111) to the open positionsz\u00e1r\u00edt\u00f3kamra (1) top (100).the spoiler (3) (1), as well as thesz\u00e1r\u00edt\u00f3kamra walls (13, 14) is bounded by the l\u00e9gj\u00e1rat (1000), the spoiler (3) and (11) between the side wall of the l\u00e9gj\u00e1raton (30) through the pillang\u00f3lemez (111), at least one of the at least twoszell\u0151z\u0151ny\u00edl\u00e1sr\u00e9sz nyit\u00e1s\u00e1valkialakul\u00f3 fels\u0151szell\u0151z\u0151 through the sz\u00e1r\u00edt\u00f3kamr\u00e1b\u00f3l ny\u00edl\u00e1sr\u00e9szen (1) open to the atmosphere vankivezetve,furthermore, at least one lower szell\u0151z\u0151ny\u00edl\u00e1sr\u00e9szen throughasz\u00e1r\u00edt\u00f3t\u00e9r (6) directly connected to the external of the airspace.申请人:Plestenjak, Joze地址:Vrhovci, c. VIII/7, 1000 Ljubljana SI国籍:SI代理机构:Kraus, Walter, Dr.更多信息请下载全文后查看。
YUMI 电源扬声器用户手册说明书

YUMITable of ContentsImportant Safety Precautions . . . . . . .2 Introduction / What’s in the Box? . . . . .3 Front & Rear Panels . . . . . . . . . . . . 4 Remote Control . . . . . . . . . . . . . . 5 Setting Up Your Speakers . . . . . . . . . . 6Connecting Audio Sources . . . . . . . . .7 USB Charging . . . . . . . . . . . . . . .9 Connecting a Sub-Woofer . . . . . . . . . .10 Specifications . . . . . . . . . . . . . . . .11 Warranty . . . . . . . . . . . . . . . . . .12Important Safety Precautions• Read these instructions .• Keep these instructions .• Heed all warnings .• Follow all instructions .• Do not use this apparatus near water .• Clean only with a dry cloth .• Do not block any ventilation openings . Install in accordance with the manufacturer’s instructions .• Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that produce heat .• Protect the power-supply cord from being walked on or pinched, particularly at plugs, convenience receptacles and the point where they exit from the apparatus .• Only use attachments / accessories specified by the manufacturer .• Use only with the cart, stand, tripod, bracket, or table specified by the manufacturer, or sold with the apparatus .When a cart is used, use caution when moving the cart/apparatus combination to avoid injury from tip-over .• Unplug this apparatus during lightning storms or when unused for long periods of time .• Refer all servicing to qualified service personnel . Servicing is required when the apparatus has been damaged in any way, such as power-supply cord or plug is damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been exposed to rain or moisture, theapparatus does not operate normally, or the apparatus has been dropped .• Apparatus shall be connected to a MAINS socket outlet witha protective earthing connection .• An appliance input coupler is used as the disconnect device - the disconnect device shall remain readily operable .• Batteries or battery packs shall not be exposed to excessive heat such as sunshine, fire or the like .CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE BACK PANEL. NO USER SERVICEABLE PARTS INSIDE. REFER SERVICINGTO QUALIFIED SERVICEPERSONNEL.DANGEROUS VOLTAGEThe lightning flash with arrowhead, within an equilateral triangle, is intended to alert the user of the presence of non-insulated “dangerous voltage” within the product’s enclosure that may be of sufficient magnitude to constitute a risk of electric shock to persons.ATTENTIONThe exclamation point within anequilateral triangle is intended toalert the user of the presence ofimportant operating and maintenance(servicing) instructions in the literatureaccompanying the apparatus.FCC Warnings• Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment .• This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules .FCC Notice:• This device complies with part 15 of the FCC Rules . Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation .Industry Canada Notice:• Complies with CAN ICES-3(B) / NMB-3(B)23™IntroductionThank you for choosing the YUMI Powered Speaker System, designed by Kanto in Canada . YUMI outputs 30 W RMS (60 W peak) per side into 6 Ohm speakers, for remarkably bold and clean sound . Excellent sensitivity and frequency response specs provide deep thumping lows andclear, scintillating highs . YUMI is a truly flexible speaker system that can accept five input sources (including optical and Bluetooth), drive a sub-woofer, charge USB devices and switch between 115 V and 230 V inputs .We recommend you read all instructions carefully before using the system, and keep them for future reference . Ensure that the Voltage Select switch is set to the correct input voltage for your location. Kanto cannot be liable for damage or injury caused by incorrect setup or use of this product .This powered speaker system was carefully tested and inspected during production, and before packaging and shipping . After unpacking, please check for any damage . It is rare that a unit is damaged during shipping, but if this happens contact your retailer immediately . You can also *****************************************************************.What’s In the Box?Power CordUser Manualsx3x8Self-Adhesive Rubber FeetSpeaker Wire (10’)x2‘AAA’ BatteriesYUMI Active Speaker(Left Channel)YUMI Passive Speaker(Right Channel)YUMI RemoteRCA - 3 .5 mm ‘Y’ cable (10’)4YUMI’s volume knob functions as an input select knob as well .Push the knob to select an input source - it cycles through the following inputs depending on what input source was last used .BLUETOOTH RCA 3.5mm OPT1 OPT2Volume/Input Select Knob9 3 .5 mm Stereo Mini-Jack InputConnector 10 Sub Woofer Output 11 Optical 1 and Optical 2TOSLINK Input Connectors 12 Right Channel Output Terminals(+ and −) for Passive Speaker Connection 13 USB Charge Ports (2 x 5 V 500 mA)14 Voltage Select Switch(115 V 60 Hz / 230 V 50 Hz)15 ON/OFF Switch16 AC Input Connection (IEC320/C14)75643189101112131415162Remote Control1 Mute2 USB Charge Mode - see page 93 Standby - press to enterStandby Mode BLUETOOTH CONTROLS4 Previous Track5 Play / Pause6 Next TrackINPUT SELECTIONS78 RCA Input Select9Input Select101112131415 Decrease Bass Output16 Decrease Treble Output VOLUME CONTROL17 Increase Volume18 Decrease Volume 36 8 910 1117 18Install two supplied AAA batteries in the back of your YUMI remote . Remote Control functions are listed below .5Supporting your digital lifestyle™6average listening room . However, it may not be possible to install the speakers in this position and since rooms vary in shape, size, and furnishing, a certain amount of experimentation is necessary to determine the most suitable position .Moving the speakers very close to the rear wall will enhance the bass frequencies but will tend to reduce soundstage depth, while moving the speakers away from the rear wall will tend to have the opposite effect . Avoid positioning the speakers close to or in the corners of the room, as this will excite undesirable room coupling in the low and middle frequencies . If the width of the rear wall is limited then toe-in the speakers slightly to reduce reflections . Room characteristics and positioning have a profound effect on the performance of the speakers, so time and effort devoted to achieving the optimum positions will be rewarded . Ensure that the ON/OFF Switch is in the OFF position .Connect the two speakers together as shown below using the supplied speaker cable . Connect the RED (+) and BLACK (−) terminals from the active speaker (left channel) to the corresponding terminals on the passive speaker (right channel) . If you wish to place yourspeakers farther apart than the supplied cable will reach, we recommend that you purchase a heavier gauge of speaker cable to minimize signal loss .Follow the instructions on the ensuing pages to connect your audio sources to YUMI . The examples in the following pages are not meant to be exhaustive - just examples .Connect the power cord from YUMI’s active speaker to the wall outlet .ATTENTIONWhen connecting audio cables the ON/OFF Switch must be turned OFF . After connecting all cables, the unit can be turned ON.When the volume is high, this system can produce noise levels that could permanently damage your hearing. YUMI is a self-powered speaker system. Do not connect the speaker terminals to the speaker outputs of a stereo amplifier. Damage may occur. Use only the power cord provided with the speakers.• Stereo RCA to 3 .5 mm stereo mini-jack ‘Y’ cable• Optical Toslink cableRCA & 3.5 mm Stereo Mini-Jack (AUX) ConnectionAUDIOOUTATTENTION*Some models of turntables include a built-in Phono Pre-Amp.7Supporting your digital lifestyle™8Bluetooth PairingDEVICESOPT 2DIGITAL DOCKYUMI features Bluetooth technology, and can be paired with many devices for wireless audio playback from your phone, MP3 player or tablet . Pairing is easy .1 . Press the Standby Button on YUMI’s remote to wake YUMI, and press the Bluetooth buttonon the YUMI remote . The Bluetooth LED will flash slowly to indicate that YUMI is in pairing mode . (Note that if the Bluetooth LED stays solid, YUMI has likely found a previously paired device in range.)2 . Enable your Bluetooth device to search for a new device . Select ‘YUMI by Kanto’ from thelist of Bluetooth devices . If prompted for a pairing code enter ‘1234’ .3 . If pairing is successful, the Bluetooth LED will remain solid . You will not need to pair thesame Bluetooth device again - ‘YUMI by Kanto’ will remain on your device list . 4 . If the device does not pair with YUMI, turn YUMI’s ON/OFF Switch to the OFF position,then repeat Steps 1 and 2 .9USB Charging OperationYUMI features two 5 V 500 mA USB charging ports on the back panel . These are convenient power connections to charge your devices .When YUMI is in Operating Mode (Power LED blue), the ports are active, and whatever devices are connected are able to draw up to 500 mA of power . When YUMI is in Standby Mode (Power LED amber), the USB charging ports will automatically turn off .The USB charging ports can be enabled even though YUMI is not operating, by simply pressing the USB Charge button on the YUMI remote . When in USB Charge Mode, the Power LED will be off, and the Signal LED will flash twice quickly, followed by a delay, and repeat . Pressing the USB Charge button on the YUMI remote again will put the unit into Operating Mode .Bluetooth Operation1 . If not previously paired, pair your Bluetooth device as described above .2 . If YUMI has been switched OFF or gone to standby mode, if another device has beenconnected to YUMI’s Bluetooth input, or if you have disconnected from YUMI’s Bluetooth input, you will need to reconnect by selecting ‘YUMI by Kanto’ from your device menu . 3 . If another device is connected to YUMI’s Bluetooth input, your device will not be able toconnect to YUMI, and you will receive a connection error . Terminate the connection of the other device first and try to Connect to ‘YUMI by Kanto’ again .4 . When you are successfully connected, the Bluetooth LED will be lit solid, and your devicewill show as Connected to ‘YUMI by Kanto’ .5 . Once connected, you can control the playback from your Bluetooth enabled device usingthe second row of buttons on YUMI’s remote control .10SpecificationsYUMI POWERED SPEAKER SYSTEMTweeters 1 inch silk domeWoofers 5 inch KevlarNominal Impedance 6 OhmSensitivity 2 .83V (/1W/1m) 87 dBPower Output 30 Watts RMS per channelFrequency Response 60 Hz - 20 kHz @ ± 3 dBInput Sensitivity 350 mV (Line RCA)Frequency Range 20 Hz - 20 kHz @ ± 6 dBTotal Harmonic Distortion < 0 .7%Crossover System 2-wayAmplifier Type Class ABInputs 1 x RCA L/R1 x 3 .5 mm stereo mini-jack2 x TOSLINK Optical1 x BluetoothOutputs 1 x Sub-Woofer2 x USB Power (5 V 500 mA)Speaker Terminals Left and Right Binding PostsRemote Control IncludedDimensions (each speaker) 6 .9” x 8 .1” x 10 .7” (175 x 205 x 272 mm)Net Weight (active) 14 .1 lbs (6 .4 kg)Net Weight (passive) 9 .3 lbs (4 .2 kg)Gross Weight 26 .7 lbs (12 .1 kg)Input Voltage / Frequency 115 V 60 Hz / 220 V 50 Hz (manually switchable) Standby Power Consumption < 0 .5 WNOTICE: The Bluetooth® word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Kanto Distribution Inc. is under license. 1113-10Limited Warranty To Original PurchaserKanto Distribution Inc . (Kanto) warrants the equipment it manufactures to be free from defects in material and workmanship for the following limited warranty period of:24 months parts and labourIf equipment fails because of such defects and Kanto or an authorized dealer is notified within 24 months from the date of shipment with proof of original invoice . Kanto will, at its option, repair or replace the equipment, provided that the equipment has not been subjected to mechanical, electrical, or other abuse or modifications . Equipment that fails under conditions other than those covered will be repaired at the current price of parts and labor in effect at the repair . Such repairs are warranted for 90 days from the day of reshipment to the original purchaser . This warranty is in lieu of all other warranties expressed or implied, including without limitation, any implied warranty or merchantability or fitness for any particular purpose, all of which are expressly disclaimed .The information in the owner’s manual has been carefully checked and is believed to be accurate . However, Kanto assumes no responsibility for any inaccuracies that may be contained in the manual . In no event will Kanto, be liable for direct, indirect, special, incidental, or consequential damages resulting from any defect or omission in this manual, even if advised of the possibility of such damages .Warranty|*********************Tel 888.848.2643To learn more about all our products, visit • Check out our full line of bookshelf and desktop speaker systems • Available in a stunning array of colors Kanto Speakers• Full line of Audio and Video Cables • Attractive white cables and heads • HDMI, Optical, Mini-jack, RCA, USB • Switchers, Hubs, Adapters • Visit /cable for more!• Visit for more!by kantolivingkantoliving。
小学上册A卷英语第六单元测验卷

小学上册英语第六单元测验卷英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1. A force can change the _______ of an object.2. A circuit must be _______ for electricity to flow.3.The sun is shining ________.4.My cat enjoys chasing ______ (小虫) in the garden.5.What is the term for a person who studies insects?A. EntomologistB. BiologistC. ZoologistD. EcologistA6.In a chemical reaction, the energy required to start the reaction is called the _____ energy.7.The __________ (历史的探讨) invites engagement.8.What is the name of the famous bear who loves honey?A. PaddingtonB. Winnie the PoohC. Yogi BearD. Smokey Bear9.The __________ (历史的回顾) enriches our understanding.10.The ________ (环境科学) informs decisions.11.Acids react with bases to form ________ and water.12.The ________ was a period of great social change in the 1960s.13.The rabbit's fur keeps it ______ (温暖).14.What is the name of the famous novel written by George Orwell?A. 1984B. Animal FarmC. Brave New WorldD. Fahrenheit 45115.The Great Depression started in the year ________.16.The ________ (computer) is powerful.17.The __________ (英国宪法) is based on many documents.18.Most plants perform ______ (光合作用) during the day.19.My _______ (猫) loves to snooze by the window.20.The ________ (海洋生物) are incredible to observe.21. A covalent bond is formed when atoms _____ electrons.22.What do we call the person who plays a role in a movie?A. DirectorB. ActorC. ProducerD. Writer23.The ________ is a playful friend.24.The puppy is _____ in the yard. (playing)25.The _____ (花草) beautify our surroundings.26.The _____ (盒子) is full of toys.27.The ________ (cello) is a musical instrument.28.How many wheels does a bicycle have?A. 1B. 2C. 3D. 429.My teacher gives us ____.30.My friend is a ______. He enjoys playing chess.31.The __________ helps to absorb nutrients from food.32.The fish swims in the ___. (water)33.小鸭子) swims in the pond with its friends. The ___34.The rabbit is ________ in the grass.35.What is the name of the famous wizard in J.K. Rowling's books?A. DumbledoreB. Harry PotterC. VoldemortD. SnapeB36. A _______ (青蛙) can be found in many colors.37.I have a cute _____ (布娃娃).38.What shape has four equal sides?A. TriangleB. RectangleC. SquareD. CircleC39.The ____ is a small, colorful fish that lives in aquariums.40.I drink _____ (milk/juice) for breakfast.41. A _____ is a region of space with a lot of stars.42.The stars are _______ (在闪耀)。
计算机专业英语试题及答案(B卷)

计算机专业英语试题及答案(B卷)湖北职业技术学院2008-2009学年度第一学期期末考核试卷考核课程:《计算机专业英语》考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级: 2007级试卷: B姓名:班级:学号:Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 机器语言 ( )2. 随机存取存储器 ( )3. 汇编语言指令 ( )4. 软件产品 ( )5. 取指—译码—执行( )6. 面向服务的 ( )7. 电子媒介 ( )8. 感染模块 ( )9. 分辨率 ( )10. 硬件维护 ( )Ⅱ. Match the following words and expressions in the leftcolumn with those similar in meaning in the right)(10%)1. output devices a. 操作系统2. silicon b. 扩展存储器3. expanded memory c. 硅4. database administrator d. 输出设备5. operating system e. 汇编语言6. assembly language f. 数据库管理员7. gateway g. 数字图像处理8. laser technology h. 网关9. digital image processing i. 作业队列10.job queue j. 激光技术1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. 广域网 _________ 6. 网络服务提供商 _________2. 超文本传输协议_________ 7. 可扩展标记语言_________3. 计算机辅助设计_________ 8. 基本输入输出系统_________4. 万维网联盟_________ 9. 信息技术_________5. 数据库管理系统_________ 10. 万维网__________Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15 %)1. _________ refers to the number of individual dots of color, known as pixels, contained on a display.A. Dot PitchB. ResolutionC. Refresh RateD. Scan Style2. A processor is composed of two functional units, they are _________.A. an arithmetic/logic unit and a storage unitB. a control unit and some registersC. a control unit and an arithmetic/logic unitD. some registers an arithmetic/logic unit3. _________ is a storage location inside the processor.A. A registerB. ALUC. ControlD. Memory4. A periodic refresh is needed to restore the information for the _________ .A. SRAMB. DRAMC. EPROMD. EEPROM5. The raw data are stored on the disk using the _________ .A. data dictionaryB. file systemC. DBMSD. DBA6. The _______ serves as an interface between hardware and software.A. systemB. application programC. operating systemD. control unit7. Most operating system have a standard set of _________ to handle the processing of all input and output instructions.A. spreadsheetB. control instructionsC. I/O operationD. data table8. _________ uses commands that are easier for programmers to understand than are machine language commands.A. Assembly languageB. High-level languageC. C languageD. C++ language9. When a _________ is used, all the devices in the network are connected to a single cable.A. bus networkB. ring networkC. star networkD. network10. Two common applications of LANs are _________ resource sharing and information resource sharing.A. softwareB. computerC. networkD. hardware11. With Internet Explorer and an Internet connection, you can search for andview information on the ________.A. Active DesktopB. ProgramsC. Phone DialerD. World Wide Web12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. E-commerce does business through _________.A. face-to-face meetingB. computerC. wire-photoD. Internet and EDI14. Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.A. data flowB. currency flowC. merchandise flowD. file flow15. Many companies use _________ to train their employees.A. technologyB. entertainmentC. multimedia applicationsD. animation(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)requirements maintain disciplinedcoding modifySoftware Engineering, which means the application of engineering to software, is a method to develop, operate and ________ software. That is, the development of software is on a systematic, _________, quantitive basis. Before starting the development of software, you have to systematically approach the problem. You have to understand the _________ (what the software is supposed to do), carry out the design, do the _________, carry out a rigorous testing and if the software is as per the requirements, release the software to the customer. Subsequently, if the customer wants some changes--refinements or enhancements then the software has to be _________. Passage A The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, which its speed and capacity have increased tremendously. Indeed, these changes have resulted inmicro-Computers that are small enough to fit on your desk and your lap.The CPU comprises the control unit and the arithmetic/logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signalsbetween main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical(comparison) functions—that is,it adds, subtracts, multiplies, divides, and does comparison. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误)(10%)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input/output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical functions. ( )5. The central processing unit (CPU) is the heart of the computer systems. ( ) Passage BA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to Business Week, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering a systembut can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(三) Choose the best answer according to the passage B(根据上文的内容选择正确的答案)(10%)1.A computer virus is a computer program that is created to make and spread _________of itself.A. programsB. virusC. copiesD. files 2.Worm spread itself except by_________. .A. networkB. E-mailC. programD. hardware 3.Antivirus program can scan and_________ virus.A. cleanB. produceC. replicateD. make 4.Trojan Horses_________ .A.quickly replicate itself and gradually attach to files, programs or the harddrive. B.infect the computer without even having to click open email attachment or any program.C.allow hackers to take control over a particular system or to steal very important data.D.avoid the virus to attack computer.5.According to Business Week, the_________ attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404B. 76,404C. 56,354D. 34,876 Passage CIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines ofprogram text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs?Here's a quick overview of the process:· Write a program.· Compile the program.· Run the program.· Debug the program.· Repeat the whole process until the program is finished.(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)1.If you want to solve the computational problem with a computer, you should learn how to_________.A. calculateB. programC. addD. subtract 2. Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe _________.A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or a _________to do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stage of programming? _________.A. Write a program.B. Debug the program.C. Print the program.D. Compile the program.(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语) (12%)1.SQL Server is designed to allow thousands of users to access the database at the same time and is a true client/server database system.2.An application software is any program designed to perform a specific function directly for the user or, in some cases, for another application program.3.A small network may only connect two computers inside a home to share a single printer and Internet connection4.There is free firewall software available that can run on your computer and provide a good level of protection to your network.(二) Translate the following paragraph into Chinese.(将下段文章翻译成汉语)(8%)Input Devices. Computer systems use many devices for input purpose. Some Input Devices allow direct human/machine communication, while some first require data to be recorded on an input medium such as magnetic material. Devices that read data magnetically recorded on specially coated plastic tapes or flexible or floppy plastic disks are popular. The keyboard of a workstation connected directly to or online to a computer is an example of a direct input device. Additional direct input devices include the mouse, input pen, touch screen, and microphone.Regardless of the type of device used, all are components for interpretation and communication between people and computer systems.命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2008-2009学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级: 2007 试卷: B执笔人:要求:明确标注每小题或每步骤得分点要求:明确标注每小题或每步骤得分点Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%) ( 本题共10分, 每小题1分)1. machine language2. Random Access Memory3. assembly language instruction4. software product5. fetch-decode-execute6. service-oriented7. electronic media8. infecting module9. resolution10. hardware maintenanceⅡ. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( d ) 6. ( e )2. ( c ) 7. ( h )3. ( b ) 8. ( j )4. ( f ) 9. ( g )5. ( a ) 10.( i )Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. WAN 6. ISP2. HTTP 7. XML3. CAD 8. BIOS4. W3C 9. IT5. DBMS 10.Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)( 本题共15分, 每小题1分)1. B2. C3. A4. B5. B6. C7. B8.A9. A 10. D 11. D 12. A 13 .D 14. B 15. CⅤ. Reading comprehension(阅读理解)(35%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)( 本题共5分, 每空1分)maintain disciplined requirements coding modified(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)( 本题共10分, 每小题2分)1. ( F )2. ( T )3. ( F )4. ( F )5. ( T )(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. C2. A3. A4. C5. B(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. B2. A3. D4. B5. CⅥ. Translation.翻译(20%)(一) Translate the following sentences into Chinese(将下列句子翻译成汉语)(12%)1. SQL服务器用于允许成前上万的用户同时访问数据库,是一个真正的客户端/服务器端的数据库系统。
宁夏吴忠市2024-2025学年高一上学期期中考试英语试卷(无答案)

2024-2025学年第一学期高一年级期中考试英语试题(考试时间:120分钟考试分值:120分)第一部分:听力(共两节,20小题;每题1.5分,满分30分)第一节(共5小题;每小题1.5分,满分7.5分)听下面5段对话。
每段对话后有一个小题,从题中所给的A、B、C三个选项中选出最佳选项。
听完每段对话后,你都有10秒钟的时间来回答有关小题和阅读下一小题。
每段对话仅读一遍。
例:How much is the shirt?A. £19.15.B. £9.18.C. £9.15.答案是C。
1. What will the man do first?A. Board a train.B. Have breakfast.C. Send an e-mail.2. How will the woman go home probably?A. By bus.B. By subway.C. By car.3. What is the woman probably?A. A doctor.B. A teacher.C. A boss.4. When did the man enter the university?A. Three years ago.B. Four years ago.C. Five years ago.5. How is the weather now?A. Rainy.B. Sunny.C. Cloudy.第二节(共15小题;每小题1.5分,满分22.5分)听下面5段对话或独白。
每段对话或独白后有几个小题,从题中所给的A、B、C三个选项中选出最佳选项。
听每段对话或独白前,你将有时间阅读各个小题,每小题5秒钟;听完后,各小题给出5看钟的作答时间。
每段对话或独白读两遍。
听第6段材料,回答第6、7题。
6. Why does the woman come to the man?A. To make an invitation.B. To offer an explanation.C. To ask for information.7. What is the probable relationship between the speakers?A. Classmates.B. Brother and sister.C. Teacher and student.听第7段材料,回答第8至10题。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
255C HAPTER 11M OVING A L OT O F D ATA Most of the examples covered so far have been moving small amounts of intermittent data using the build-in HID device driver. This approach has the benefit of being simple to implement since the operating system contains all of the driver code necessary to enable an application program to monitor and control the device. An overview of the “Buttons and Lights” solution of Chapter 7 is shown in Figure 11-1. We wrote the PC host application program and all of the I/O device firmware to implement this solution.<<insert diagram here>>Figure 11-1 Overview of HID application256USB Design by Example - Second Edition – Review DraftMany applications require a large amount of data to be moved and, conceptually, the solution shown in Figure 11-2, is the same as the HID application.Unfortunately the Windows operating system does not have a simple BlockIOtransfer driver so there will be additional steps to be completed in this designexample. I don’t like changing too many variables at the same time so I shall use the same hardware as the HID example – the key points of a BlockIO transferexample will be covered in depth so that you can understand how to implementyour specific design. Most of the firmware developed in Chapter 7 will bereusable so I will only focus on the differences in this chapter.<<insert diagram here>>Figure 11-2. Overview of a BlockIO transfer applicationMost BlockIO devices operate on discrete elements of data such as a single pageor a single image and some method of separating multiple blocks is required.Typically an I/O device will operate on a single block at a time and will indicatewhen the next block can be transferred. I chose to use a HID control/statuschannel for this “separating” function since we know exactly how this works and it neatly partitions the control/status and data transfer functions into two well-defined interfaces.Chapter 11: Moving A Lot Of Data257Step 1: Design the HardwareA real BlockIO device would spend a great deal of time in this step. A printer,for example, would receive a page of data from the USB then would have todrive motors to move paper and a print head and would have to put ink onto thepaper. This book assumes that you already know how to do this – you design I/O equipment for a living but need to understand how to add the “USB ingredient”.The focus of this design is “moving a lot of data” so this example receives blocks of data as fast as possible and stores it in its local memory. Once all of theblocks are received (up to 32K bytes in this design example) an operation isperformed to change the data in some way and it is then made available for a“bulk read”.This example will use the same hardware as the “buttons and lights” examplesince the USBSIMM contains a convenient 32K buffer.Step 2: Complete the DescriptorsFrom the descriptor’s perspective, adding a bulk in and a bulk out endpoint is asmall addition endpoint to the descriptor defined in Chapter 7. Figure 11-3shows the descriptor set for our “BlockIO” example.; This example has one Device Descriptor with One Configuration and Two Interfaces:;HID: One HID Descriptor - to make PC host software simpler; One Endpoint Descriptor - for HID Input Reports; One Report Descriptor - one byte IN and one byte OUT reports;BlockIO: Two Endpoint DescriptorsCSEGD eviceDescriptor:DB18, 1; Length, TypeDB10H, 1; USB Rev 1.1 (=0110H, low=10H, High=01H)DB0, 0, 0; Class, Subclass and ProtocolDB EP0SizeDB42H, 42H, 20H, 42H, 0, 1; Vendor ID, Product ID and VersionDB1, 2, 0; Manufacturer, Product & Serial# NamesDB1; #ConfigsC onfigurationDescriptor:DB9, 2; Length, TypeDB LOW(ConfigLength), HIGH(ConfigLength)DB2, 1, 3; #Interfaces, Configuration#, Config. NameDB10000000b; Attributes = Bus PoweredDB250; Max. Power is 250x2 = 500mAH IDInterfaceDescriptor:DB9, 4; Length, TypeDB0, 0, 1; ID, No alternate setting, HID uses EP1 InDB3; Class = Human Interface DeviceDB0, 0; Subclass and ProtocolDB4; Interface NameH IDDescriptor:DB9, 21H; Length, TypeDB0, 1; HID Class Specification complianceDB0; Country localization (=none)DB1; Number of descriptors to followDB22H; And it's a Report descriptor258USB Design by Example - Second Edition – Review DraftDB LOW(ReportLength), HIGH(ReportLength)H IDEndpointDescriptor:DB7, 5; Length, TypeDB10000001b; Address = IN 1DB00000011b; InterruptDB EP0Size, 0 ; Maximum packet size (this example only uses 1)DB10; Poll every 10msec secondsB lockIOInterfaceDescriptor:DB9, 4; Length, TypeDB1, 0, 2; ID, No alternate setting, BlockIO uses EP2 In/OutDB0FFH; Class = Vendor Defined (needs BlockIO.sys)DB0, 0; Subclass and ProtocolDB5; Interface NameB lockIOInEndpointDescriptor:DB7, 5; Length, TypeDB10000010b; Address = IN 2DB00000010b; BulkDB EP0Size, 0 ; Maximum packet sizeDB0; IgnorredB lockIOOutEndpointDescriptor:DB7, 5; Length, TypeDB00000010b; Address = OUT 2DB00000010b; BulkDB EP0Size, 0 ; Maximum packet sizeDB0; IgnorredC onfigLength EQU $ - ConfigurationDescriptorR eportDescriptor:; Generated with HID Tool, copied to hereDB6, 0, 0FFH; Usage_Page (Vendor Defined)DB9, 1; Usage (I/O Device)DB0A1H, 1; Collection (Application)DB19H, 1; Usage_Minimum (User Defined)DB29H, 8; Usage_Maximum (User Defined)DB15H, 80H; Logical_Minimum (-128)DB25H, 7FH; Logical_Maximum (127)DB75H, 8; Report_Size (8)DB95H, 1; Report_Count (1)DB81H, 2; Input (Data,Var,Abs)DB19H, 1; Usage_Minimum (User Defined)DB29H, 8; Usage_Maximum (User Defined)DB95H, 3; Report_Count (3)DB91H, 2; Output (Data,Var,Abs)DB0C0H; End_CollectionR eportLength EQU $-ReportDescriptorS tring0:; Declare the UNICODE stringsDB4, 3, 9, 4; Only English language strings supportedS tring1:; ManufacturerDB(String2-String1),3 ; Length, TypeDB"U",0,"S",0,"B",0," ",0,"D",0,"e",0,"s",0,"i",0,"g",0,"n",0," ", 0DB"B",0,"y",0," ",0,"E",0,"x",0,"a",0,"m",0,"p",0,"l",0,"e",0S tring2:; Product NameDB(String3-String2),3DB"E",0,"C",0,"H",0,"O",0,"1",0S tring3:; Configuration NameDB(String4-String3),3DB"H",0,"I",0,"D",0,"w",0,"i",0,"t",0,"h",0DB"B",0,"l",0,"o",0,"c",0,"k",0,"I",0,"O",0S tring4:; Interface 1 NameDB(String5-String4),3DB"H",0,"I",0,"D",0S tring5:; Interface 2 NameDB(EndOfDescriptors-String5),3DB"B",0,"l",0,"o",0,"c",0,"k",0,"I",0,"O",0E ndOfDescriptors:DB0; Backstop for String DescriptorsFigure 11-3. Descriptors for HID+BlockIO exampleChapter 11: Moving A Lot Of Data259 Note that this single device has two interface descriptors: one defines the HIDinterface and, during enumeration, the HIDUSB.SYS driver will be matched tothis interface; the second interface descriptor defines the BlockIO interface andthis will be matched up to BLOCKIO.SYS (described later in the chapter). There are two device drivers to support the two interfaces within this example.Step 3: Implement Microcontroller CodeAlmost all of the firmware created for the microcontroller in Chapter 7 isreusable in this BlockIO example. There are a few changes to make to theDevice and String Descriptors to identify a different device and changes to howthe Reports are handled but the main addition is software routine to support theadded bulk input and bulk output endpoints.The EZ-USB component, like other higher end USB microcontrollers, supportsdouble buffering on bulk endpoints. This means that there are two physicalbuffers assigned to an endpoint so the one can be filled from USB while the other is being emptied by the USB microcontroller. This technique improves thethroughput of the data movement since it results in fewer NAKs from the USBmicrocontroller.When the PC host is sending bulk data to the I/O device we should do everything possible to absorb this data at the maximum rate. It is technically possible for the PC host to send nineteen 64-byte bulk packets in a single, full-speed frame. Ifthe PC host sends us a packet and we are not able to receive it (due to no bufferspace available) then we will NAK this transaction. The PC host now has to send the data again – this is a waste of USB bandwidth. A PING-NYET protocol wasadded for more efficient bus utilization of a high-speed bus – a PING is sent bythe PC host to inquire if the I/O device has a buffer available for data; this is atoken-only packet. If the I/O device replies with a NAK then the PC host willstart another PING cycle. If the I/O device replies with an ACK then the PC host will start on OUT data transfer.Our full-speed example will service the OUT requests as fast as possible tominimize the NAKs generated. I decided to poll the OUT endpoint in the mainroutine since this was faster than an interrupt service routine. The EZ-USB mustprogrammatically empty the OUT FIFO and save this data in external memory.There is too much overhead in doing a move-byte in a loop so the routinepartially un-rolls the loop with 16 in-line MOVX instructions. The EZ-USB’sautopointer is used to speed the loop. I measured up to 13 or 14 packetstransferred in a single frame (with 3 or 4 NAKs) so there is still a little room forimprovement. Figure 11-4 shows the new MAIN module and the full source forall of the firmware is included on the CDROM.260USB Design by Example - Second Edition – Review DraftMAIN:ACALL DoTaskList; BlockIO is polled for performanceJMP MAINEnableDevice:RETDisableDevice:MOV B, #0; Stop the ECHO functionRETDoTaskList:MOV A, B; Get task list (8 tasks)JB ACC.0, TASK0; Receive BlockIO from PC HostJB ACC.1, TASK1; Prepare BlockIO for PC HostRETTASK0:; PC Host is about to send a BlockIO buffer. Get readyMOV DPTR, #DataBufferCLR AMOV PacketCounter, AMOV Timer0LOW, A; Clear Timer 0MOV Timer0HIGH, AMOV R1, #LOW(EP2OutStatus)WaitForPacket:MOVX A, @R1JB ACC.1, WaitForPacket; Wait for Out2BSY = 0SETB Timer0_Enable; Time the data transfer ; Receive the packet as fast as possible; First, set up some loop variablesMOV R0, #LOW(AutoPtrHIGH); Use AutoPtr to speed executionMOV A, #HIGH(EP2OutBuffer); Overflows every time!MOVX@R0, AINC R0; Point to AutoPtrLOWMOV A, #LOW(EP2OutBuffer)MOVX@R0, AINC R0; Point to AutoPtr.DataMOV R7, #4; Assume a full buffer (4*16=64) EP2OutLoop:MOVX A, @R0; Get new data. This also bumps ptrMOVX@DPTR, A; Save new dataINC DPTR; Unroll loop to speed execution timeMOVX A, @R0; Unroll loop 2MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 3MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 4MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 5MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 6MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 7MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 8MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 9MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 10MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 11MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 12MOVX@DPTR, AINC DPTRChapter 11: Moving A Lot Of Data261 MOVX A, @R0; Unroll loop 13MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 14MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 15MOVX@DPTR, AINC DPTRMOVX A, @R0; Unroll loop 16MOVX@DPTR, AINC DPTRDJNZ R7, EP2OutLoopINC PacketCounterMOV R0, #LOW(EP2OutByteCount)MOVX A, @R0; Get actual Byte LengthMOVX@R0, A; Tell SIE we're done with the bufferCJNE A, #64, LastOneJMP WaitForPacket; Get the next oneLastOne:CLR Timer0_Enable; Stop the timerMOV LastPacketValidBytes, ACLR B.0; We're done with Task0RETTask1:; Prepare a BlockIO buffer for PC HostMOV DPTR, #DataBufferCLR AMOV Timer0LOW, A; Clear Timer 0MOV Timer0HIGH, AMOV R0, #LOW(AutoPtrHIGH)MOV A, #HIGH(EP2InBuffer)MOVX@R0, AMOV R1, #LOW(EP2InStatus)WaitForBuffer:MOVX A, @R1JB ACC.1, WaitForBufferSETB Timer0_Enable; Time this data xfer operationMOV R0, #LOW(AutoPtrLOW)MOV A, #LOW(EP2InBuffer)MOVX@R0, AINC R0; Point to AutoPtr.DataMOV R7, #4; Assume a full buffer (4*16=64)EP2InLoop:MOVX A, @DPTR; Get dataINC DPTRMOVX@R0, A; Fill buffer. This also bumps ptrMOVX A, @DPTR; Unroll loop 2INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 3INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 4INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 5INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 6INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 7INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 8INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 9INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 10INC DPTRMOVX@R0, A262USB Design by Example - Second Edition – Review DraftMOVX A, @DPTR; Unroll loop 11INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 12INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 13INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 14INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 15INC DPTRMOVX@R0, AMOVX A, @DPTR; Unroll loop 16INC DPTRMOVX@R0, ADJNZ R7, EP2InLoopMOV R0, #LOW(EP2InByteCount)DJNZ PacketCounter, ValidateFullBufferMOV A, LastPacketValidBytes; Get actual Byte LengthMOVX@R0, A; Validate the short bufferCLR Timer0_Enable; Stop the timerCLR B.1; We're done with Task1RETValidateFullBuffer:MOV A, #64; Default is a full packetMOVX@R0, A; Validate the bufferJMP WaitForBuffer; To prepare more dataFigure 11-4. Servicing the bulk endpoints in MAINStep 4: The BlockIO Device DriverWindows does not include a simple USB device, bulk transfer driver so I wroteone for this example. If you do not wish to learn about writing a Windowsdevice driver you may skip this step.I capture the essence of writing a WDM device driver in this section. Notehowever, that the “devil is in the details” and I recommend that you buy WalterOney’s book Programming the Microsoft Windows Driver Model if you plan toedit this, or create your own device driver. Walter takes over 600 pages to cover what I will highlight in this section.An essential tool you will also need is the Windows 2000 Device Driver Kit.This is a free download from /hwdev. It is over 40MB andcontains many interesting examples and a complete set of Include and Libraryfiles that are required to build this example.Chapter 11: Moving A Lot Of Data263 A USB-centric WDM device driver is one of the easier device drivers to write since much of the code is provided by the operating system (or Walter Oney). Figure 11-5 shows the WDM architecture, which I shall explain, from the top down.Figure 11-5. Windows 2000 I/O ArchitectureNote that the code that we must write is depicted in ovals while the code supplied with the operating system is in boxes. To access a USB I/O device an application program makes Win32 API subroutine calls such as CreateFile, ReadFile etc. The Win32 subsystem uses a system service interface to pass this request to the I/O manager. This interface moves the program from user mode to kernel mode and there is therefore much parameter checking, data copy and other schemes to protect the kernel. The exact details of this interface need not be known since we have one Microsoft-supplied module talking to another Microsoft-supplied module. All Kernel software is object oriented which, for us, means that it uses pre-defined data structures that are manipulated with pre-defined actions. A key object (or data structure) for this discussion is the I/O Request Packet, or IRP,264USB Design by Example - Second Edition – Review Draftthat is created by the I/O manager as a result of the Win32 system call. This IRP is passed around the kernel as a message and various modules process it. TheIRP is eventually returned to the I/O manager which then provides a response tothe Win32 subsystem and therefore to the user application.The Device Drivers block handles the IRP. In the general case this will involveaccessing the PC host hardware via the Hardware Abstraction Layer. Thecomplexities of dealing with re-assignable interrupt levels and direct memoryaccess (DMA) are excessive but, as we shall see, the USB programmer does nothave to deal with this. Figure 11-6 shows more detail inside the Device Driversblock.Figure 11-6. WDM’s layered device driversThe IRP is passed to the top of the device driver stack – this could be filter driver as shown in the general model on the left or directly to the Function Driver asshown in the example on the right. An upper filter can inspect and act on anyIRP before the function driver sees it and a lower filter can inspect and act on any IRP after the function driver has processed it. The function driver is what mostpeople call the device driver and it may be a monolithic module or be constructed of a class driver plus a miniport driver. In our case, the function driver willChapter 11: Moving A Lot Of Data265 create USB Request Blocks, or URBs, that it will embed inside an IRP and willforward to the next lower device driver.IRP’s eventually reach the bus driver which, in our case, is the USB host controller. Microsoft supplies this USB bus driver (USBD.SYS) and does not allow programmatic access to the USB host controller. Many PC Host applications are making multiple requests to the I/O manager that directs all of the USB traffic via USBD.SYS. There is a lot of buffer management and scheduling to correctly manage the shared resource called USB. The good news is that we do not have to deal with interrupt levels or DMA and this will make our device drivers much easier to write and debug.The device driver stack of Figure 11-6 is built from the bottom upwards and several key objects are created. As the PC host is powering up it runs several enumeration programs to discover what hardware is currently installed in your PC host. If the PCI enumerator discovers a USB host controller it will load up USBD.SYS which will create a Physical Device Object (PDO) to represent this unique hardware. If multiple USB host controllers are discovered then each will be represented by a unique PDO. Each USB is now enumerated and attached devices are identified (see Chapter 3 for this detail). Each unique device will cause a device driver to be loaded that creates a Functional Device Object (FDO). The registry is queried to discover if lower or upper filters should also be added to the stack. If two identical USB I/O devices are discovered then the device driver will handle this case (described later). The structure and location of each layer of this driver stack is saved by the I/O manager which will supply this data inside an IRP object for each message it dispatches.I apologize if this is getting a little deep. You could stop here and be thankful that many class drivers are supplied with Windows, or, you can take a deep breath, and jump inside a driver.266USB Design by Example - Second Edition – Review DraftIt is best to think of a device driver as a set of subroutines that you must supply.Figure 11-7 shows an overview of the subroutines that are required and areoptional for our USB I/O device.Figure 11-7. A WDM driver is a set of subroutinesOnce our device driver is loaded into memory the operating system callsDriverEntry – it is our responsibility to complete the DriverObject passed to uswith the information about the system functions that we will supply. TheDriverObject’s MajorFunction table has default values for all of the subroutineentry points that are over-written by DriverEntry. The second parameter passed to DriverEntry is a pathname to a registry entry that matches this driver – if weneed to access the registry then we should save this pathname. The DriverEntry routine for our BlockIO example is shown in Figure 11-8.e xtern "C" NTSTATUS DriverEntry(PDRIVER_OBJECT DriverObject, PUNICODE_STRING RegistryPath) {KdPrint((DRIVERNAME "This is BETA software (V0.9) \n"));// See if we're running under Win98 or Win2Kwin98 = IsWin98();KdPrint((DRIVERNAME "Running under Windows(R) "));if (win98) KdPrint(("98\n")); else KdPrint(("2000\n"));// Initialize function pointersDriverObject->DriverUnload = DriverUnload;DriverObject->DriverExtension->AddDevice = AddDevice;DriverObject->MajorFunction[IRP_MJ_CREATE] = DispatchCreate;DriverObject->MajorFunction[IRP_MJ_CLOSE] = DispatchClose;DriverObject->MajorFunction[IRP_MJ_READ] = DispatchReadWrite;DriverObject->MajorFunction[IRP_MJ_WRITE] = DispatchReadWrite;DriverObject->MajorFunction[IRP_MJ_DEVICE_CONTROL] = DispatchControl;DriverObject->MajorFunction[IRP_MJ_POWER] = DispatchPower;DriverObject->MajorFunction[IRP_MJ_INTERNAL_DEVICE_CONTROL] = DispatchInternalControl;DriverObject->MajorFunction[IRP_MJ_PNP] = DispatchPnp;return STATUS_SUCCESS;}Figure 11-8. The BlockIO DriverEntry routineChapter 11: Moving A Lot Of Data267 KdPrint is a debug routine that prints messages to a kernel debug console. I usedebugview which is a free download from .The AddDevice routine is called by the PnP manager for each instance of identical hardware it finds. If you have three USBSIMM boards connected, for example, and their INF files all point to the same driver (this one) then AddDevice will be called three times. It is our responsibility to create an FDO for this added device and to register its existence so that application programs can find it. I prefer to use a GUID to identify my I/O devices; this unique identifier is know by the I/O device and is also know by the applications program and they use it as a rendezvous between user and kernel mode software. The AddDevice routine for our BlockIO example is shown in Figure 11-9.N TSTATUS AddDevice(PDRIVER_OBJECT DriverObject, PDEVICE_OBJECT pdo) {PAGED_CODE();KdPrint((DRIVERNAME "Adding Device\n"));NTSTATUS status;// Create a functional device object to represent the hardware we're managing.PDEVICE_OBJECT fdo;ULONG dxsize = (sizeof(DEVICE_EXTENSION) + 7) & ~7;ULONG xsize = dxsize + GetSizeofGenericExtension();status = IoCreateDevice(DriverObject, xsize, NULL, FILE_DEVICE_UNKNOWN,FILE_DEVICE_SECURE_OPEN, FALSE, &fdo);PDEVICE_EXTENSION pdx = (PDEVICE_EXTENSION) fdo->DeviceExtension;pdx->DeviceObject = fdo;pdx->Pdo = pdo;// Declare the buffering method we'll use for read/write requestsfdo->Flags |= DO_DIRECT_IO;// Link our device object into the stack leading to the PDOpdx->LowerDeviceObject = IoAttachDeviceToDeviceStack(fdo, pdo);// Set power management flags in the device objectfdo->Flags |= DO_POWER_PAGABLE;// Initialize to use the GENERIC.SYS librarypdx->pgx = (PGENERIC_EXTENSION) ((PUCHAR) pdx + dxsize);GENERIC_INIT_STRUCT gis = {sizeof(GENERIC_INIT_STRUCT)};gis.DeviceObject = fdo;gis.Pdo = pdo;gis.Ldo = pdx->LowerDeviceObject;gis.RemoveLock = &pdx->RemoveLock;gis.StartDevice = StartDevice;gis.StopDevice = StopDevice;gis.RemoveDevice = RemoveDevice;RtlInitUnicodeString(&gis.DebugName, LDRIVERNAME);gis.Flags = GENERIC_SURPRISE_REMOVAL_OK;status = InitializeGenericExtension(pdx->pgx, &gis);// Register the interface with a GUIDstatus = GenericRegisterInterface(pdx->pgx, &BlockIO_GUID);// Clear the "initializing" flag so that we can get IRPsfdo->Flags &= ~DO_DEVICE_INITIALIZING;return status;}Figure 11-9. The BlockIO AddDevice routine268USB Design by Example - Second Edition – Review DraftThere is no error checking in Figure 11-9, I did this to reduce the size of thefigure – the version on the CDROM has extensive error checking and should beused for development. Many of the tasks that must be implemented in a devicedriver are very specialized but are always the same code for every device. Toreduce the amount of difficult code that we have to write, Walter Oney hassupplied a GENERIC.SYS driver that implements the “tricky pieces” such aspower management and the instrumentation interfaces. He supplies the sourcecode of the generic.sys helper functions for those readers who really want toknow what is going on (I did peek at the code, but then decided to trust theexpert). Our AddDevice routine creates links into the generic.sys library.At this stage of the events our I/O device driver has been loaded and is ready foraction. If we were to remove the I/O device at this time then the driver would be unloaded and the FDO deleted. If we replug our USB I/O device then the PnPmanager enumerates it again, the driver is reloaded and started via itsDriverEntry routine and the PnP manager will call AddDevice again. Nothingelse happens until an application program tries to use this device driver; so letsmove our attention to there for a moment.An application program will use the same search algorithm that I presented inChapter 6. This program makes system calls to the PnP manager and requests alist of attached devices; we then search through this list for our particular I/Odevice. The only difference between this BlockIO example and the HID example of Chapter 6 is that we use a different GUID. The searching will identify asystem name which the application program will use in a CreateFile Win32 APIcall- this will be delivered to our device driver as a call to StartDevice.The StartDevice routine for our BlockIO example is shown in Figure 11-10.Again there is no error checking in the figure to save space, the real source codeon the CDROM contains extensive error checking and the support routines. Theroutine interrogates the I/O device to ensure that it has the correct endpoints andthen opens a pipe to each of these endpoints. The I/O manager will create aHANDLE that is will pass back to the application program so that subsequentreads and writes will manipulate the correct pipes.N TSTATUS StartDevice(PDEVICE_OBJECT fdo, PCM_PARTIAL_RESOURCE_LIST raw,PCM_PARTIAL_RESOURCE_LIST translated) {PAGED_CODE();KdPrint((DRIVERNAME "Starting Device\n"));NTSTATUS status;PDEVICE_EXTENSION pdx = (PDEVICE_EXTENSION) fdo->DeviceExtension;URB urb;// Read our device descriptor. Check that we have the correct interface and get a handle for each pipeUsbBuildGetDescriptorRequest(&urb, sizeof(_URB_CONTROL_DESCRIPTOR_REQUEST),USB_DEVICE_DESCRIPTOR_TYPE, 0, 0, &pdx->dd, NULL, sizeof(pdx->dd), NULL);。