Mid_Sem_Exam_A_2016
2010年全国职称英语理工类(A级)全真模拟训练

一、选择题1.在下列网络拓扑结构中,中心节点的故障可能造成全网瘫痪的是 c 。
A. 星型拓扑B. 总线型拓扑C. 环型拓扑D. 树型拓扑2.1994年4月20日我国被国际上正式承认为接入Internet的国家,所使用专线的带宽为 d 。
A. 32kbpsB. 64kbpsC. 128kbpsD. 256kbps3.如果要添加一个新的帐号,应选择Outlook Express中的 a 菜单。
A. 文件B. 查看C. 工具D. 邮件4.为了指导计算机网络的互联、互通和互操作,ISO颁布了OSI参考模型,其基本结构分为 c 。
A. 6层B. 5层C. 7层D. 4层5.关于防火墙的功能,说法错误的是 d 。
A. 所有进出网络的通信流必须经过防火墙B. 所有进出网络的通信流必须有安全策略的确认和授权C. 防火墙能保护站点不被任意连接D. 防火墙能够代替防病毒软件6.以下应用领域中,属于典型的多媒体应用的是 b 。
A. CSCW计算机支持协同工作B. 视频会议系统C. 电子表格处理D. 网络远端控制7.网络通信设备中的Hub中文全称是 c 。
A. 网卡B. 中继器C. 服务器D. 集线器8.调制解调器(Modem)的功能是实现 a 。
A. 模拟信号与数字信号的转换B. 数字信号的编码C. 模拟信号的放大D. 数字信号的整形9.保障信息安全最基本、最核心的技术是 a 。
A. 信息加密技术B. 信息确认技术C. 网络控制技术D. 反病毒技术10.以下设备中,不是多媒体计算机中常用的图像输入设备的是 c 。
A. 数码照相机B. 彩色扫描仪C. 条码读写器D. 数码摄像机二、操作题1.Internet应用1、(考生单击窗口下方"打开[internet应用]应用程序"启动IE)请运行Internet Explorer,并完成下面的操作:利用Internet Explorer浏览器提供的搜索功能,选取搜索引擎Google(网址为:/)搜索含有单词”basketball”的页面,将搜索到的第一个网页内容以文本文件的格式保存到考生文件夹下,命名为SS.txt。
AADEBUG2003 XXX1 Instrumenting self-modifying code

AADEBUG2003XXX1 Instrumentingself-modifying codeJonas Maebe∗,Koen De Bosschere∗,1∗ELIS,Ghent University,Sint-Pietersnieuwstraat41,9000Gent,BelgiumABSTRACTAdding small code snippets at key points to existing code fragments is called instrumentation.It is an estab-lished technique to debug certain otherwise hard to solve faults,such as memory management issues and data races.Dynamic instrumentation can already be used to analyse code which is loaded or even generated at run time.With the advent of environments such as the Java Virtual Machine with optimizing Just-In-Time compilers,a new obstacle arises:self-modifying code.In order to instrument this kind of code correctly,one must be able to detect modifications and adapt the instrumentation code accordingly,preferably without incurring a high penalty speedwise.In this paper we propose an innovative technique that uses the hard-ware page protection mechanism of modern processors to detect such modifications.We also show how an instrumentor can adapt the instrumented version depending on the kind of modificiations as well as an experimental evaluation of said techniques.KEYWORDS:dynamic instrumentation;instrumenting self-modifying code1IntroductionInstrumentation is a technique whereby existing code is modified in order to observe or modify its behaviour.It has a lot of different applications,such as profiling,coverage analysis and cache simu-lations.One of its most interesting features is however the ability to perform automatic debugging, or at least assist in debugging complex programs.After all,instrumentation code can intervene in the execution at any point and examine the current state,record it,compare it to previously recorded information and even modify it.Debugging challenges that are extremely suitable for analysis through instrumentation include data race detection[RDB99,RDB01]and memory management checking[Sew02].These are typically problems that are very hard to solve manually.However,since they can be described perfectly using a set of rules(e.g.the memory must be allocated before it is accessed,or no two threads must write to the same memory location without synchronising),they are perfect candidates for automatic verifi-cation.Instrumentation provides the necessary means to insert this verification code with little effort on the side of the developer.The instrumentation can occcur at different stages of the compilation or execution process.When performed prior to the execution,the instrumentation results in changes in the object code on disk, which makes them a property of a program or library.This is called static instrumentation.If the addition of instrumentation code is postponed until the program is loaded in memory,it becomes a property of an execution.In this case,we call it dynamic instrumentation.Examples of stages where static instrumentation can be performed are directly in the source code[Par96],in the assembler output of the compiler[EKKL90],in the compiled objects or programs 1E-mail:{jmaebe,kdb}@elis.UGent.beXXX2JONAS MAEBE,KOEN DE BOSSCHERE (e.g.EEL[LS96],ATOM[SE94],alto[DBD96]).The big advantage of static instrumentation is that it must be done only once,after which one can perform several executions without having to reinstru-ment the code every time.This means that the cost of instrumenting the code can be relatively high without making such a tool practically unusable.The larges disadvantage of static instrumentation is that it requires a complex analysis of the tar-get application to detect all possible execution paths,which is not always possible.Additionally,the user of a static instrumentation tool must know which libraries are loaded at run time by programs he wants to observe,so that he can provide instrumented versions of those.Finally,every time a new type of instrumentation is desired,the application and its libraries must be reinstrumented.Most of the negative points of static instrumentation are solved in its dynamic counterpart.In this case,the instrumentation is not performed in advance,but gradually at run time as more code is executed.Since the instrumentation can continue while the program is running,no prior analysis of all possible execution paths is required.It obviously does mean that the instrumentation must be redone every time the program is executed.This is somewhat offset by having to instrument only the part of the application and its libraries that is covered by a particular execution though.One can even apply dynamic optimization techniques[BDA01]to further reduce this overhead.When using dynamic instrumentation,the code on disk is never modified.This means that a single uninstrumented copy of an application and its libraries suffices when using this technique,no matter how many different types of instrumentation one wants to perform.Another consequence is that the code even does not have to exist on disk.Indeed,since the original code is read from memory and can be instrumented just before it is executed,even dynamically loaded and generated code pose no problems.However,when the program starts modifying this code,the detection and handling of these modifications is not possible using current instrumentation techniques.Yet,being able to instrument self-modifying code becomes increasingly interesting as run time systems that exhibit such behaviour gain more and more popularity.Examples include Java Virtual Machines, environment and emulators with embedded Just-in-Time compilers in general. These environments often employ dynamic optimizing compilers which continuously change the code in memory,mainly for performance reasons.Instrumenting the programs running in such an environment is often very easy.After all,the dynamic compiler or interpreter that processes said programs can do the necessary instrumentation most of the time.On the other hand,observing the interaction of the environments themselves with the applications on top and with the underlying operating system is much more difficult.Never-theless,this ability is of paramount importance when analysing the total workload of a system and debugging and enhancing these virtual machines.Even when starting from a system that can already instrument code on thefly,supporting self-modifying code is a quite complex undertaking.First of all,the original program code must not be changed by the instrumentor,since otherwise program’s own modifications may conflict with these changes later on.Secondly,the instrumentor must be able to detect changes performed by the pro-gram before the modified code is executed,so that it can reinstrument this code in a timely manner. Finally,the reinstrumentation itself must take into account that an instruction may be changed using multiple write operations,so it could be invalid at certain points in time.In this paper we propose a novel technique that can be used to dynamically instrument self-modifying code with an acceptable overhead.We do this by using the hardware page protection facilities of the processor to mark pages that contain code which has been instrumented as read-only.When the program later on attempts to modify instrumented code,we catch the resulting pro-tection faults which enables us to detect those changes and act accordingly.The described method has been experimentally evaluated using the DIOTA(Dynamic Instrumentation,Optimization and Transformation of Applications[MRDB02])framework on the Linux/x86platform by instrumenting a number of JavaGrande[Gro]benchmarks running in the Sun1.4.0Java Virtual Machine.The paper now proceeds with an overview of dynamic instrumentation in general and DIOTA in particular.Next,we show how the detection of modified code is performed and how to reinstru-ment this code.We then present some experimental results of our implementation of the describedINSTRUMENTING SELF-MODIFYING CODE XXX3Figure1:Dynamic instrumentation the DIOTA waytechniques and wrap up with the conclusions and our future plans.2Dynamic instrumentation2.1OverviewDynamic instrumentation can be be done in two ways.One way is modifying the existing code,e.g. by replacing instructions with jumps to routines which contain both instrumentation code and the replaced instruction[MCC+95].This technique is not very usable on systems with variable-length instructions however,as the jump may require more space than the single instruction one wants to replace.If the program later on transfers control to the second instruction that has been replaced, it will end up in the middle of this jump instruction.The technique also wreaks havoc in cases of data-in-code or code-in-data,as modifying the code will cause modifications to the data as well.The other approach is copying the original code into a separate memory block(this is often called cloning)and adding instrumentation code to this copy[BDA01,SKV+03,MRDB02].This requires special handling of control-flow instructions with absolute target addresses,since these addresses must be relocated to the instrumented version of the code.On the positive side,data accesses still occur correctly without any special handling,even in data-in-code situations.The reason is that when the code is executed in the clone,only the program counter(PC)has a different value in an instrumented execution compared to a normal one.This means that when a program uses non-PC-relative addressing modes for data access,these addresses still refer to the original,unmodified copy of the program or data.PC-relative data accesses can be handled at in-strumentation time,as the instrumentor always knows the address of the instruction it is currently instrumenting.This way,it can replace PC-relative memory accesses with absolute memory accesses based on the value the PC would have at that time in a uninstrumented execution.2.2DIOTADIOTA uses the cloning technique together with a cache that keeps track of already translated in-struction blocks.It is implemented as a shared library and thus resides in the same address space as the program it instruments.By making use of the LD_PRELOAD environment variable under Linux, the dynamic linker(ld.so)can be forced to load this library,even though an application is not ex-plicitly linked to it.The init routines of all shared libraries are executed before the program itself is started,providing DIOTA an opportunity to get in control.As shown in Figure1,the instrumentation of a program is performed gradually.First,the instruc-tions at the start of the program are analysed and then copied,along with the desired instrumentation code,to the clone(a block of memory reserved at startup time,also residing in the program’s address space).During this process,direct jumps and calls are followed to their destination.The instrumenta-tion stops when an instruction is encountered of which the destination address cannot be determined unequivocally,such as an indirect jump.XXX4JONAS MAEBE,KOEN DE BOSSCHERECloneOriginal programInstrumentedcodeMarkertableInstrumentedcodeMarkerFigure2:Data structures used by DIOTAAt this point,a trampoline is inserted in the clone.This is a small piece of code which will pass the actual target address to DIOTA every time the corresponding original instruction would be executed. For example,in case of a jump with the target address stored in a register,the trampoline will pass the value of that specific register to DIOTA every time it is executed.When DIOTA is entered via such a trampoline,it will check whether the code at the passed address has already been instrumented.If that is not the case,it is instrumented at that point.Next,the instrumented version is executed.Figure2shows how DIOTA keeps track of which instructions it has already instrumented and where the instrumented version can be found.A marker consisting of illegal opcodes is placed after every block of instrumented code(aligned to a4-byte boundary),followed by the translation table. Such a translation table starts with two32bit addresses:the start of the block in the original code and its counterpart in the clone.Next,pairs of8bit offsets between two successive instructions in the respective blocks are stored,with an escape code to handle cases where the offset is larger than255 bytes(this can occur because we follow direct calls and jumps to their destination).In addition to those tables,an AVL tree is constructed.The keys of its elements are the start and stop addresses of the blocks of original code that have been instrumented.The values are the start addresses of the translation tables of the corresponding instrumented versions.Every instruction is instrumented at most once,so the keys never overlap.This means thatfinding the instrumented version of an instruction boils down tofirst searching for its address in the AVL tree and if found, walking the appropriate translation table.To speed up this process,a small hash table is used which keeps the results of the latest queries.A very useful property of this system is that it also works in reverse:given the address of an instrumented instruction,it is trivial tofind the address of corresponding original instruction.First, the illegal opcodes marker is sought starting from the queried address and next the table is walked just like before until the appropriate pair is found.This ability of doing two-way translations is indispensable for the self-modifying code support and proper exception handling.Since the execution is followed as it progresses,code-in-data and code loaded or generated at run time can be handled without any problems.When a trampoline passes an address to DIOTA of code it has not yet instrumented,it will simply instrument it at that time.It is irrelevant where this code is located,when it appeared in memory and whether or not it doubles as dataDIOTA has several modes of operation,each of which can be used separately,but most can be combined as well.Through the use of so-called backends,the different instrumentation modes can be activated and the instrumentation parameters can be modified.These backends are shared libraries that link against DIOTA and which can ask to intercept calls to arbitrary dynamically linked routines based on name or address,to have a handler called whenever a memory access occurs,when a basic block completes or when a system call is performed(both before and after the system call,with the ability to modify its parameters or return value).Several backends can be used at the same time.INSTRUMENTING SELF-MODIFYING CODE XXX5 Other features of the DIOTA framework include the ability to handle most extensions to the80x86 ISA(such as MMX,3DNow!and SSE)and an extensible and modular design that allows easy im-plementation of additional backends and support for newly introduced instructions.This paper de-scribes the support for instrumenting self-modifying code in DIOTA.For other technical details about DIOTA we refer to[MRDB02].2.3Exception handlingAn aspect that is of paramount importance to the way we handle self-modifying code,is the handling of exceptions(also called signals under Linux).The next section will describe in more detail how we handle the self-modifying code,but since it is based on marking the pages containing code that has been instrumented as read-only,it is clear that every attempt to modify such code will cause a protection fault(or segmentation fault)exception.These exceptions and those caused by other operations must be properly distinguished,in order to make sure that the program still receives signals which are part of the normal program execution while not noticing the other ones.This is especially important since the Java Virtual Machine that we used to evaluate our implementation uses signals for inter-thread communication.When a program starts up,each signal gets a default handler from the operating system.If a program wants to do something different when it receives a certain signal,it can install a signal handler by performing a system call.This system call gets the signal number and the address of the new handler as arguments.Since we want to instrument these user-installed handlers,we have to intercept these system calls.This can be achieved by registering a system call analyser routine with DIOTA.This instructs DIOTA to insert a call to this routine after every system call in the instrumented version of the pro-gram.If such a system call successfully installed a new signal handler,the analyser records this handler and then installs a DIOTA handler instead.Next,when a signal is raised,DIOTA’s handler is activated.One of the arguments passed to a signal handler contains the contents of all processor registers at the time the signal occurred,in-cluding those of the instruction pointer register.Since the program must not be able to notice it is being instrumented by looking at at that value,it is translated from a clone address to an original program address using the translation tables described previously.Finally,the handler is executed under control of DIOTA like any other code fragment.Once the execution arrives at the sig_return or sig_rt_return system call that ends this signal’s execution,DIOTA replaces the instruction pointer in the signal context again.If the code at that address is not yet instrumented,the instruction pointer value in the context is replaced with the address of a trampoline which will transfer control back to DIOTA when returning from the signal’s execution.Otherwise,the clone address corresponding to the already instrumented version is used. 3Detecting modificationsDynamically generated and loaded code can already be handled by a number of existing instrumen-tors[BDA01,MRDB02].The extra difficulty of handling self-modifying code is that the instrumen-tation engine must be able to detect modifications to the code,so that it can reinstrument the new code.Even the reinstrumenting itself is not trivial,since a program may modify an instruction by performing two write operations,which means the intermediate result could be invalid.There are two possible approaches for dealing with code changes.One is to detect the changes as they are made,the other is to check whether code has been modified every time it is executed.Given the fact that in general code is modified far less than it is executed,thefirst approach was chosen.The hardware page protection facilities of the processor are used to detect the changes made page.Once a page contains code that has been instrumented,it will be write-protected.The consequence is thatXXX6JONAS MAEBE,KOEN DE BOSSCHEREFigure3:Exception handling in the context of self-modifying code supportany attempt to modify such code will result in a segmentation fault.An exception handler installed by DIOTA will intercept these signals and take the appropriate action.Since segmentation faults must always be caught when using our technique to support self-modifying code,DIOTA installs a dummy handler at startup time and whenever a program installs the default system handler for this signal(which simply terminates the process if such a signal is raised),or when it tries to ignore it.Apart from that,no changes to the exception handling support of DIOTA have been made,as shown in Figure3.Whenever a protection fault occurs due to the program trying to modify some previously in-strumented code,a naive implementation could unprotect the relevant page,perform the required changes to the instrumented code inside the signal handler,reprotect the page and continue the pro-gram at the next instruction.There are several problems with this approach however:•On a CISC architecture,most instructions can access memory,so decoding the instruction that caused the protection fault(to perform the change that caused the segmentation fault in the handler)can be quite complex.•It is possible that an instruction is modified by means of more than one memory write opera-tion.Trying to reinstrument after thefirst write operation may result in encountering an invalid instruction.•In the context of a JiT-compiler,generally more than one write operation occurs to a particular page.An example is when a page was already partiallyfilled with code which was then exe-cuted and thus instrumented,after which new code is generated and placed on that page as well.A better way is to make a copy of the accessed page,then mark it writable again and let the program resume its execution.This way,it can perform the changes it wanted to do itself.After a while,the instrumentor can compare the contents of the unprotected page and the the buffered copy tofind the changes.So the question then becomes:when is this page checked for changes,how long will it be kept unprotected and how many pages will be kept unprotected at the same time.INSTRUMENTING SELF-MODIFYING CODE XXX7 All parameters are important for performance,since keeping pages unprotected and checking them for changes requires both processing and memory resources.The when-factor is also important for correctness,as the modifications must be incorporated in the clone code before it is executed again.On architectures with a weakly consistent memory model(such as the SPARC and PowerPC), the program must make its code changes permanent by using an instruction that synchronizes the instruction caches of all processors with the current memory contents.These instructions can be intercepted by the instrumentation engine and trigger a comparison of the current contents of a page with the previously buffered contents.On other architectures,heuristics have be used depending on the target application that one wants to instrument to get acceptable performance.For example,when using the Sun JVM1.4.0running on a80x86machine under Linux,we com-pare the previously buffered contents of a page to the current contents whenever the thread that caused the protection fault does one of the following:•It performs a kill system call.This means the modifier thread is sending a signal to another thread,which may indicate that it hasfinished modifying the code and that it tells the other thread that it can continue.•It executes a ret or other instruction that requires a lookup tofind the appropriate instru-mentation code.This is due to the fact that sometimes the modifying and executing threads synchronise using a spinlock.The assumption here is that before the modifying thread clears the spinlock,it will return from the modification routine,thus triggering aflush.Although this method is by no means a guarantee for correct behaviour in the general case,in our experience it always performs correctly in the context of instrumenting code generated by the Sun JVM1.4.0.The unprotected page is protected again when it has been checked N successive times without any changes having been made to it,or when another page has to be unprotected due to a protection fault.Note that this optimisation only really pays off in combination with only checking the page contents in the thread that caused the initial protection fault.The reason is that this ensures that the checking limit is not reached prematurely.Otherwise,the page is protected again too soon and a lot of extra page faults occur,nullifying any potential gains.Finally,it is possible to vary the number of pages that are being kept unprotected at the same time.Possible strategies are keeping just one page unprotected for the whole program in order to minimize resources spent on buffering and comparing contents,keeping one page unprotected per thread,or keeping several pages unprotected per thread to reduce the amount of protection faults. Which strategy performs best depends on the cost of a page fault and the time necessary to do a page compare.4Handling modificationsDifferent code fragments in the clone are often interconnected by direct jumps.For example,when –while instrumenting–we arrive at an instruction which was already instrumented before,we generate a direct jump to this previously instrumented version instead of instrumenting that code again.This not only improves efficiency,but it also makes the instrumentation of modified code much easier,since there is only one location in the clone we have to adapt in case of a code modification.Because of these direct jump interconnections,merely generating an instrumented version of the modified code at a different location in the clone is not enough.Even if every lookup for the in-strumented version of the code in that fragment returns one of the new addresses in the clone,the old code is still reachable via de direct jumps from other fragments.Removing the direct jumps and replacing them with lookups results in a severe slowdown.Another solution would be keeping track of to which other fragments each fragment refers and adapting the direct jumps in case of changes.This requires a lot of bookkeeping however,and chang-XXX8JONAS MAEBE,KOEN DE BOSSCHERE Program Normal Instrumented Slowdown Relative#of Relative# name execution(s)execution(s)protection faults of lookups FFT40.2895.86 2.382305409609 MolDyn22.0365.57 2.985105423174 SparseMatmult24.2991.09 3.753751874669 HeapSort 5.2541.037.82147791700553 LUFact 4.5338.178.43174021655753 SearchBench23.92429.1017.9481446337596 Crypt8.91175.1519.66128456696704 RayTraceBench28.87652.1122.5966118026878Table1:Test results for a number of sequential JavaGrande2.0benchmarksing one fragment may result in a cascade effect,requiring a lot of additional changes elsewhere in the clone.For these reasons,we opted for the following three-part strategy.The optimal way to handle the modifications,is to reinstrument the code in-place.This means that the previously instrumented version of the instructions in the clone are simply replaced by the new ones.This only works if the new code has the same length as(or is shorter than)the old code however,which is not always the case.A second way to handle modifications can be applied when the instrumented version of the previous instruction at that location was larger than the size of an immediate jump.In this case,it is possible to overwrite the previous instrumented version with a jump to the new version.At the end of this new code,another jump can transfer control back to rest of the original instrumentation code.Finally,if there is not enough room for an immediate jump,the last resort isfilling the room originally occupied by the instrumented code with breakpoints.The instrumented version of the new code will simply be placed somewhere else in the code.Whenever the program then arrives at such a breakpoint,DIOTA’s exception handler is entered.This exception handler has access to the address where the breakpoint exception occurred,so it can use the translation table at the end of the block to look up the corresponding original program address.Next,it can lookup where the latest instrumented version of the code at that address is located and transfer control there.5Experimental evaluation5.1General observationsWe evaluated the described techniques by implementing them in the DIOTA framework.The perfor-mance and correctness were verified using a number of tests from the JavaGrande[Gro]benchmark, running under the Sun JVM1.4.0on a machine with two Intel Celeron processors clocked at500MHz. The operating system was Redhat Linux7.3with version2.4.19of the Linux kernel.Several practical implementation issues were encountered.The stock kernel that comes with Red-hat Linux7.3,which is based on version2.4.9of the Linux kernel,contains a number offlaws in the exception handling that cause it to lock up or reboot at random times when a lot of page protection exceptions occur.Another problem is that threads in general only have limited stack space and al-though DIOTA does not require very much,the exception frames together with DIOTA’s overhead were sometimes large enough to overflow the default stacks reserved by the instrumented programs. Therefore,at the start of the main program and at the start of every thread,we now instruct the kernel to execute signal handlers on an alternate stack.DIOTA’s instrumentation engine is not re-entrant and as such is protected by locks.Since a thread can send a signal to another thread at any time,another problem we experienced was that sometimes a thread got a signal while it held the instrumentation lock.If the triggered signal handler was not。
大学英语期中测试 The Mid-Term Test

Mid-term testI. Choose the best that completes the sentences. (15 points)1. Extensive reporting on television has helped to ________ interest in a wide variety sports and activities.A gatherB generateC assembleD yield2. My brother’s plans are very ________ ; he wants to master English, French and Spanish before he is sixteen.A abundantB ambitiousC arbitraryD aggressive3. Computer science is an ________ subject for law students at our university, and many students choose it.A opticalB optionC opponentD optional4. Most broadcasters maintain that TV has been unfairly criticized and argue that the power of the medium is ________.A grantedB impliedC exaggeratedD remedied5. In the Chinese household, grandparents and other relatives play ________ roles in raising children.A insensibleB indispensableC incapableD infinite6. In Britain people ________ four million tons of potatoes every year.A swallowB disposeC consumeD exhaust7. Cancellation of the flight ________ many passengers to spend the night at the airport.A result inB propelC demandD recommend8. Operation which left patients________ and in need of long periods of recovery time now leave them feeling relaxed and comfortable.A exhaustedB abandonedC injuredD deserted9. When we fill in a form, we will usually write down our name, address, ________, etc.A jobB employmentC occupationD profession10. American boys and girls, with ________ and part-time jobs now have an annual purchasing power of four billion dollars.A wagesB salariesC incomesD allowances11. The Car Club couldn’t ________ to meet the demands of all its members.A ensureB guaranteeC assumesD confirm12. They had a fierce ________ as to whether their company should restore the trade relationship which was broken many years ago.A debateB clashC disagreementD contest13. You should ________ being late for your class.A avoidB missC overtakeD leave14. Yong people are not ________ to stand and look at works of art; they want art they can participate in.A conservativeB contentC confidentD generous15. We’d like to________ a table for five for dinner this evening.A preserveB reserveC retainD sustainII Complete the following sentences with phrases or expressions given below. Change the form where necessary.(10 points)1. If I tell the police I was with you that day, will you ________ me ________?2. The Chinese government has ________ been combating drug trafficking.3. She likes everything to be ________ before she starts work.4. I love literature and admire a lot of famous writers, and I like Ernest Hemingway ________.5. Don’t worry for my illness; what I need is________ a few days’ rest.6. The friendly contacts between our two peoples ________ the 2nd century.7. The wealthier emigrants ________ poverty by selling their jewels.8. This candidate does not ________ our company’s philosophy.9. Who is to ________ the company’s business when the boss is away?10. Just think what would happen if every single woman ________ and refused to do housework.III.Reading Comprehension(30%)(2'×15)Directions:In this section, there are 4 passages followed by questions or unfinished statements. For each of them there are four choices marked A, B, C, and D. You should decide on the best choice.PASSAGE 1Another cultural aspect of nonverbal communication is one that you might not think about: space. Every person perceives himself to have a sort of invisible shield surrounding his physical body. When someone comes too close, he feels uncomfortable. When he bumps onto someone, he feels obligated to apologize. But the size of a person’s“ comfort zone” depends on his cultural ethnic origin. For example, in casual conversation, many Americans stand about four feet apart. In other words, they like to keep each othe r“ at arms length”, people in Latin or Arab cultures, in contrast, stand very close to each other, and touch each other often. If someone from one of those cultures stands too close to an American while in conversation, the American may feel uncomfortable and back away.When Americans are talking, they expect others to respond to what they are saying. To Americans, polite conversationalists empathize by displaying expressions of excitement or disgust, shock or sadness. People with a “poker face”, whose emotions are hidden by a deadpan expression, are looked upon with suspicion. Americans also indicate their attentiveness in a conversation by raising their eyebrows, nodding, smiling politely and maintaining good eye contact. Whereas some cultures view direct eye contact as impolite or threatening, Americans see it as a sign of genuineness and honesty. If a person doesn’t look you in the eye, American might say, you should question his motives—or assume that he doesn’t like you. Yet with all the concern for eye contact, Americans still consider staring — especially at strangers —to be rude.1. What the author discussed in the previous section is most probably about.A. classification of nonverbal communicationB. the reasons why people should think about spaceC. the relationship between communication and spaceD. some other cultural aspects of nonverbal communication2. How far people keep to each other while talking is closely associated with their _________ .A. originB. cultureC. customD. nationality3. When an Italian talks to an Arabian on informal occasions,.A. he stands about four feet awayB. “comfort zone” does not existC. keeping close enough is preferredD. communication barriers may emerge4. A “poker face” (Line 3,Para. 2) refers to a face whic h is .A. attentiveB. emotionalC. suspiciousD. expressionless5. In a conversation between friends, Americans regard it as sincere and truthful to .A. maintain direct eye contactB. hide emotions with a deadpan expressionC. display excitement or disgust, shock or sadnessD. raise their eyebrows, nod and smile politelyPASSAGE 2Questions 6 to 10 are based on the following passage.We all know that DNA has the ability to identify individuals but, because it is inherited, there are also regions of the DNA strand which can relate an individual to his or her family (immediate and extended), tribal group and even an entire population. Molecular Genealogy (宗谱学) can use this unique identification provided by the genetic markers to link people together into family trees. Pedigrees (家谱) based on such genetic markers can mean a breakthrough for family trees whereinformation is incomplete or missing due to adoption, illegitimacy or lack of records. There are many communities and populations which have lost precious records due to tragic events such as the fire in the Irish courts during Civil War in 1921 or American slaves for whom many records were never kept in the first place.The main objective of the Molecular Genealogy Research Group is to build a database containing over 100,000 DNA samples from individuals all over the world. These individuals will have provided a pedigree chart of at least four generationsand a small blood sample. Once the database has enough samples to represent the world genetic make-up, it will eventually help in solving many issues regarding genealogies that could not be done by relying only on traditional written records. Theoretically, any individual will someday be able to trace his or her family origins through this database.In the meantime, as the database is being created, molecular genealogy can already verify possible or suspected relationships between individuals“. For example, if two men sharing the same last name believe that they are related, but no written record proves this relationship, we can verify this possibility by collecting a sample of DNA from both and looking for common markers (in this case we can look primarilyat the Y chromosome (染色体)),” explains Ugo A. Perego, a member of the BYU Molecular Genealogy research team.6. People in a large area may possess the same DNA thread becauseA. DNA is characteristic of a regionB. they are beyond doubt of common ancestryC. DNA strand has the ability to identify individualsD. their unique identification can be provided via DNA7. The possible research of family trees is based on the fact thatA. genetics has achieved a breakthroughB. genetic information contained in DNA can be revealed nowC. each individual carries a unique record of who he is and how he is related to othersD. we can use DNA to prove how distant an individual is to a family, a group or a population8. The Molecular Genealogy Research Group is building a database for the purpose ofA. offering assistance in working out genealogy-related problemsB. solving many issues without relying on traditional written recordsC. providing a pedigree chart of at least four generations in the worldD. confirming the assumption that all individuals are of the same origin9. If two men suspected for some reason they have a common ancestor,A. we can decide according to their family treeB.we can find the truth from their genetic markersC. we can compare the differences in their Y chromosomeD. we can look for written records to prove their relationship10. Which of the following CANNOT be inferred from the passage?A. We are a walking, living, breathing record of our ancestorsB. Many American slaves did not know who their ancestors were.C. An adopted child generally lacks enough information to prove his identity.D. Molecular genealogy can be used to prove a relationship between individuals. PASSAGE 3Questions 11 to 15 are based on the following passage.In recent years, teachers of introductory courses in Asian American studies have been facing a dilemma nonexistent a few decades ago, when hardly any texts in that field were available. Today, excellent anthologies(文选)and other introductory texts exist, and books on individual Asian Americans are published almost weekly. Even professors who are experts in the field find it difficult to decide which of these to assign to students; non-experts who teach in related areas and are looking for writings for and by Asian American to include in survey courses are in an even worse position.A complicating factor has been the continuing lack of specialized one-volume reference works on Asian Americans, such as biographical dictionaries or desktop encyclopedias. Such works would enable students taking Asian American studies courses (and professors in related fields) to look up basic information on Asian American individuals, institutions, history, and culture without having to wade through mountains of primary source material. In addition, given such works. Asian American studies professors might feel more free to include more challenging AsianAmerican material in their introductory reading lists, since good reference works allow students to acquire on their own the background information necessary to interpret difficult or unfamiliar material.11. The author is primarily concerned with ______.A. responding to a criticismB. describing a course of studyC. discussing a problemD. evaluating a past course of action12. The “dilemma”(Line 2, Para.1) can best be characterized as being caused by the necessity to make a choice when faced with a ______.A. lack of acceptable alternativesB. lack of strict standards for evaluating alternativesC. preponderance of bad alternatives as compared to goodD. multitude of different alternatives13. Biographical dictionaries and desktop encyclopedias are _____A. primary source materialsB. introductory textsC. excellent anthologiesD. reference materials14. Which of the following is implied about the introductory courses in Asian American studies a few decades ago?A. The range of different textbooks that could be assigned for such courses was extremely limitedB. The texts assigned as readings in such courses were often not very challenging for studentsC. Students often complained about the texts assigned to them in such coursesD. Such courses were offered only at schools whose libraries were rich in primary sources15. According to the passage, the existence of good one-volume reference works about Asian Americans could result in ______.A. increased agreement among professors of Asian American studies regarding the quality of the sources available in their fieldB. an increase in the number of students sighing up for introductory courses in Asian American studiesC. increased accuracy in writings that concern Asian American history and cultureD. the inclusion of a wider range of Asian American material in introductory reading lists in Asian American studiesIV Translate the following paragraph into English. ( 25 points )汉语中“关系”一词,有时可以用来表示“网络”。
Mid-termExam

Mid-termExam期中考试九年级英语试题(总分150分考试时间120分钟)注意事项:1、本试题分第I卷和第II卷两部分。
第I卷1-7页为选择题,95分;第II卷7-10页为⾮选择题,55分;共150分。
2、答第Ⅰ卷前务必将⾃⼰的姓名、考号、考试科⽬涂写在答题卡上。
考试结束,试题和答题卡⼀并收回。
3、第Ⅰ卷每题选出答案后,都必须⽤2B铅笔把答题卡上对应题⽬的答案标号(ABCD)涂⿊。
如需改动,必须先⽤橡⽪擦⼲净,再改涂其它答案。
4、听⼒填表题为第II卷的第四⼤题,在试卷第7页上。
第Ⅰ卷(选择题,共95分)⼀、听⼒选择(共15⼩题,计15分;每⼩题约有8秒钟的答题时间)(⼀)听句⼦,选择正确答语。
每个句⼦只读⼀遍。
()1. A. Yes, I did B. Yes he did C. No, he doesn’t()2. A. Maybe you should take a walk before you going to bed.B. It doesn’t matter.C. I can’t sleep well, either.()3. A. Yes, she is. B. She likes pop music. C. We like her very much.()4. A. I expect so B. No, it isn’t. C. Yes, it is.()5. A.I don’t like it at all. B. By asking teachers for help. C. By bus.(⼆) 听对话及问题,然后选择正确答案。
每段对话及⽂婷听两遍。
()6. A. Yes, she can B. No, she can’t. C. She is not sure.()7. A. Put it in the bank. B. Watch it C. Grow it.()8. A. Fred’s B. Jim’s C. John’s()9. A. Junk food. B. Vegetables C. Junk food and vegetables.()10. A. Math B. English C. Either math or English()11. A. To stay at home. B. To answer the telephone C. To go out.()12. A. He could give food to homeless people.B. He could give away food to homeless people.C. He could give out food at the food bank.()13. A. To become a soccer player. B. To go to college C. Sorry, I don’t know. ()14. A. Lazy. B. Crazy. C. Hardworking.()15. A. They are running. B. They’re waiting for the bus. C. They’re going home. (注意:请同学们翻到第7页第Ⅱ卷第四⼤题,继续做听⼒填表题。
中小学英语教育研究方法线上网课u校园期末考试

中小学英语教育研究方法线上网课u校园期末考试1、12.That is a good way ________ him ________ English. [单选题] *A.to help;forB.helps;withC.to help;with(正确答案)D.helping;in2、We _______ play basketball after school. [单选题] *A. were used toB. used to(正确答案)C. use toD. are used to3、This message is _______. We are all _______ at it. [单选题] *A. surprising; surprisingB. surprised; surprisedC. surprising; surprised(正确答案)D. surprised; surprising4、When you are tired, listen to music and try to _______ yourself. [单选题] *A. supportB. showC. playD. relax(正确答案)5、( ) You had your birthday party the other day,_________ [单选题] *A. hadn't you?B. had you?C. did you?D. didn't you?(正确答案)6、The little boy saved his money ______ he could buy his mother a gift on Mother’s Day.()[单选题] *A. butB. such thatC. in order toD. so that(正确答案)7、The man lost his camera and he ______ it now.()[单选题] *A. foundB. is findingC. is looking forD. looks for(正确答案)8、Will you be able to finish your homework _______? [单选题] *A. by the timeB. in time(正确答案)C. once upon a timeD. out of time9、--Can I _______ your dictionary?--Sorry, I’m using it. [单选题] *A. borrow(正确答案)B. lendC. keepD. return10、This year our school is _____ than it was last year. [单选题] *A. much more beautiful(正确答案)B. much beautifulC. the most beautifulD. beautiful11、_______ after dinner is good for our health. [单选题] *A. WalksB. Walking(正确答案)C. WalkedD. Walk12、I’m sorry there are ______ apples in the fridge. You must go and buy some right now.()[单选题] *A. a littleB. littleC. a fewD. few(正确答案)13、Have you done something _______ on the weekends? [单选题] *A. special(正确答案)B. soreC. convenientD. slim14、You can ask()is on duty there tonight. [单选题] *A. WhatB. whomC. whoever(正确答案)D. whomever15、82.—Is there a bookshop near here?—Yes. Walk ________ the road for five minutes and you'll see one near a big tree. [单选题] *A.toB.along(正确答案)C.ofD.about16、Our school is beautiful. How about _______? [单选题] *A. theirs(正确答案)B. theirC. theyD. them17、While I _____ the morning paper, a headline caught my eye.. [单选题] *A. have readB. was reading(正确答案)C. had readD. am reading18、He was very excited to read the news _____ Mo Yan had won the Nobel Prize for literature [单选题] *A. whichB. whatC. howD. that(正确答案)19、—______ is it from your home to the bookstore?—About 15 kilometers.()[单选题] *A. How far(正确答案)B. How muchC. How longD. How many20、_____he was seriously ill, I wouldn’t have told him the truth. [单选题] *A.If I knewB.Had I known(正确答案)C.Did I knowD.Were I known21、()late for the meeting again, Jack! 一Sorry, I won t. [单选题] *A.Don’tB. Be notC.Don't be(正确答案)D.Not be22、Grandfather lives with us. We all _______ him when he gets ill. [单选题] *A. look after(正确答案)B. look atC. look forD. look like23、There is something wrong with my teeth. I’ve had?a _______. [单选题] *A. toothache(正确答案)B. headacheC. stomachacheD. heartache24、A?pen _______ writing. [单选题] *A. is used toB. used toC. is used for(正确答案)D. used for25、The old woman doesn’t feel _______ though she lives _______. [单选题] *A. alone; lonelyB. alone; aloneC. lonely; lonelyD. lonely; alone(正确答案)26、--Is that the correct spelling?--I don’t know. You can _______ in a dictionary [单选题] *A. look up itB. look it forC. look it up(正确答案)D. look for it27、Generally speaking, it is _______ to ask a woman’s age in western countries. [单选题] *A. possibleC. not polite(正确答案)D. polite28、6.—How can we get to the school?—________ bus. [单选题] *A.ToB.OnC.By(正确答案)D.At29、89.The blackboard is ________ the classroom. [单选题] *A.nextB.betweenC.in front ofD.in the front of(正确答案)30、The language school started a new()to help young learners with reading and writing. [单选题] *A. course(正确答案)B. designC. event。
IntensiveReadingMid-termTest(附答案)(五篇材料)

IntensiveReadingMid-termTest(附答案)(五篇材料)第一篇:Intensive Reading Mid-term Test(附答案)Intensive ReadingMid-term Test26th 10, 2010Part IDictationPart IIFill in the blank with a preposition in each sentence.1.He groped __for__the door handle in the dark.2.My heart went __out___to the families for I too have just lost someone dear to me.3.The man sneaked __about__the place watching for a chance to steal something.4.Journalists who were tipped __off__about the incident raced to the scene.5.As the speaker felt much uneasy, a cold sweat broke _out_on the back of his neck.6.She spent most of her life living __up__to her parents’ ideals.7.The adoption of this policy will relieve the unions __of___a tremendous burden.8.The accountant’s errors involved everyone __in___a great deal of extra work.9.Pressure on study space has crowded __out__new students from many university libraries.10.Huge groups of people gathered at the Hall, calling __for__the resignation of the Minister responsible for the fiasco.11.When the government took office, the inexperienced young hopefuls were pushed __aside__in the scramble for places.12.We can’t hope to catch __up__with the motor launch in front of us;it’s a v ery high-powered one.13.All the formalities had been attended _to___.14.I was so excited to see snow that I was indifferent _to__the cold.15.Mary has derived a good deal of benefit __from__her tuition.16.The old lady was made fun of as she had lavished affection __on__the cruel and naughty boy, Tom Sullivan.17.Newhouses spring __up__almost in a night during the housing boom.18.Most people willingly conform __to__the customs of the society.19.Mr.Walton kept track __of___his business by telephone when he was in hospital.20.He absolutely adhered __to___what he said at the conference: he had not changed his mind in any way.21.Mama had arranged __for___the old lady to come whenever needed.22.You needn’t trouble to wash the dishes;I will see __to__those.23.We have inherited a very confused situation, which we are now trying to straighten __out___.24.As matters stand, I’m not in a position to inquire _about__the reading of the new constitution.25.He often stays __up__after midnight to watch the live broadcast of the Formula 1motor race.26.Point all our aerials upwards.Then we can pick __up__signals for help from the burning plane more clearly.27.After the merge with General Motor, we will be able to compete __with__continental firms in an enlarged market.Part III/ 6Choose one word or phrase that best completes the ughing again, he drew his sword and ____us, hacking wildly.A.clutched atB.charged atC.groped forD.sneaked upon2.How do you skaters manage to ____on the slippery surface all the time?e to your feetB.get to your feetC.rise to your feetD.keep on your feet3.Suddenly, the woman fainted and ____the ground.A.settled ontoB.tipped overC.collapsed ontoD.cracked against4.As variously ____, the Indians numbered from 14 million to 40 million in Co lumbus’s time.A.evaluatedB.assessedC.estimatedD.weighed5.The president observed at the news conference that it was only a ____fluctuation of oil prices.A.momentousB.momentaryC.momentumD.monetary6.He suggested an amendment in the project _____of the recent developments.A.in the lightB.regardlessC.relatingD.relevant to7.You must see the story in its right ____.A.respectiveB.perspectiveC.aspectD.angle8.The government attached top priority ____reforming the legal system.A.overB.onC.uponD.to9.The movie is about a serial killer who ____the police with phone calls.A.interruptedB.hauntedC.disturbedD.taunted10.Chances of ceasefire seem ampler now that the two countries only diverge ____details.A.in the matter ofB.for the matter ofC.with regard ofD.in reference of11.The restaurant’s ____is Italian, not French.A.cuisineB.dishesC.coursesD.recipe12.Mr.Tompson, the ____librarian is going to deliver a speech in the first hall on how to use the on-line catalogue of the university.A.primalB.chiefC.mainD.primary13.According to a latest survey, the ____life span of adult females in China is 72.5 monplace14.A steam engine is the machine that ____heat into energy.A.altersB.changesC.transformsD.converts15.The lake ____its name ____an earlier French explorer who happened to spot the glimmering waves while got lost in the forest.A.derived …fromB.originated …fromC.initiated …fromD.co mmenced …from16.It isn’t acceptable to make too many ____into otherpeople’saffairs.A.investigationsB.inquiriesC.inspectionsD.explorations17.Students, friends and relatives were all present at the funeral to pay their last tribute to the ____teB.formerC.lifelessD.deceased18.According to the weather forecast, which is usually ____, it will snow this afternoon.A.preciseB.exactC.accurateD.perfect19.There is no ____reason why he is promoted over Phil, the workaholic.A.conceivableB.convincedC.imaginableD.credulous Part IVReading comprehensionAfter reading the text, make the best choice for each statement according to what you’ve read.A historic change is taking place in higher education.Professors are being held responsible as never before for how well they serve students.It has become as common in colleges and universities for students to grade professors as for professors to grade students.In fact, student ratings have become the most widely used and, in many cases, the only source of information on teaching effectiveness.In comparing three studies of the same 600 four-year colleges, it was found that the number of colleges using student ratings to evaluate teachers had climbed from 29 percent to 68 percent.No other method of evaluation approached that degree of usage, and other studies have found similar results.One reason that student evaluations of teachers have become so popular is that they are easy to administrate and to score.But they also are easy to abuse.If they are to shed meaningful light on teachers’ performance, the ratings must be used in a way that reflects at least some of what we’ve learned about them from research and from experience.Research and experience have shown us, forexample, that student ratings should never be the only basis for evaluating teaching effectiveness.There is much more to teaching than what is evaluated on student rating forms.When ratings are used, we know that students should not be expected to judge whether the materials used in a course are up to date or how well the teacher knows the subject matter of the course.These judgments require professional background and are best left to the professor’s colleagues.On the other hand, students should be asked to estimate what they’ve learned in a course, and to report on such things as a professor’s ability to communicate at the student’s level, professional beh avior in the classroom, relationship with students, and ability to arouse interest in the subject.1.Which of the following can best summarize the main idea of this passage?A.Student ratings are the only source of information on teaching effectiveness.B.Ratings have become the most widely used source of information.C.Besides student ratings, there are other methods to evaluate teachers.D.Student ratings are very popular and should be properly used.2.Which of the following statements if true according to the passage?A.Student evaluations of teachers are popular because they are extremely accurate.B.In student ratings, students should not be asked questions that require professional background.C.Student ratings can be used under any circumstances.D.All colleges are inclined to use student ratings to evaluate teachers.3.In student ratings all the following questions can be asked except that ____.A.“Can the teacher make himself easily understood?”B.“How does the teacher deal with students?”C.“Is what is taught new?”D.“Are students interested in what is taught?”4.By saying “But they also are easy to abuse”, the author means “____”.A.teachers are easy to be misunderstoodB.teachers are easy to be wrongedC.student ratings can be easily put to wrong useD.student ratings can be easily made use of to attack teachers5.The word “approach”(Para.2)is closest in meaning to “____”.A.stick e e roundD.attach to Part VTranslation1.他的眼神向来冷漠平静。
高三英语信息技术单选题50题

高三英语信息技术单选题50题6.She often _____ documents in the office software.A.editsB.makesC.createsD.designs答案:A。
本题考查动词在信息技术语境中的运用。
“edit”有“编辑”之意,在办公室软件中经常是编辑文档,符合语境。
“makes”通常指制作,范围比较宽泛,不如“edits”具体;“creates”强调创造新的东西,编辑文档不是创造新文档;“designs”主要是设计,与编辑文档的语境不符。
7.He _____ a new folder to store his files.A.buildsB.makesC.createsD.forms答案:C。
“create”有创建之意,创建新文件夹用“creates”比较合适。
“builds”通常用于建造较大的实体物体;“makes”制作的对象比较宽泛,不如“creates”准确;“forms”主要指形成某种形状或结构,不太适合创建文件夹的语境。
8.She _____ a file by mistake and had to restore it.A.deletedB.removedC.lostD.discarded答案:A。
“delete”表示删除,不小心删除了文件符合语境。
“removed”通常指移除某个物体,不一定是删除文件;“lost”是丢失,不一定是主动删除导致的;“discarded”侧重于丢弃不要的东西,不如“deleted”准确。
9.He _____ the file to another location.A.movedB.shiftedC.transferredD.carried答案:C。
“transfer”有转移、传送之意,把文件转移到另一个位置用“transferred”比较恰当。
“moved”和“shifted”比较笼统,没有“transfer”在信息技术语境中那么准确;“carried”通常指携带,不太适合文件转移的语境。
2016研究生学术英语写作期末考试试卷

2016研究生学术英语写作期末考试试卷Part I Recognizing topic sentences (20%)Directions: Read the sentences in each group, and decide which one is the best topic sentence. Write best TS on the line next to it and decide what is wrong with the other sentences, too general, too specific or incomplete? (P.6)Part II Identifying the parts of a topic sentence (20%)Directions: Circle the topic and underline the controlling idea(s) in each of the following sentences.(P.9)Part III Specific supporting details (20%)Directions: Decide which of the following statements is an opinion (O), a fact that needs proof (F-NP), or a specific supporting detail (SSD). (P.40)Part IV Choosing the best paraphrase (20%)Directions: Read the original passages. Choose the best paraphrase from the choices given and mark it “Best.” Mark the others “Too sim.” for too similar, “No cit.” if there is no in-text citation, or “Inc./Inacc.” for incomplete and/or inaccurate information. (P.130)Part V Introductory paragraphs (20%)Directions: Read each of the following sets of sentences and put them in a logical order to form introductory paragraphs. Write the thesis statement last.(P.62)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2
Q2
Velocity Potential - Stream function
f (x, y ) = xA y + By A+1 , A ≥ 0, B ≥ 0
(20 points)
A function possibly describing a two-dimensional flow is given as
→ − V = vr e ˆ ˆ ˆ r + vθ e θ + vz e z
Polar
→ − Divergence (dot product) of a Vector, V → − ∂u ∂v ∂w ∇· V = + + ∂x ∂y ∂z → − ∇× V = Cartesian
2
∂ 2ψ ∂x∂y
2
,
where ∇2 is the Laplacian operator. The above equation can be non-dimensionalized using reference length L, reference velocity U and reference pressure ρU 2 . Determine the functional form of reference stream-function ψ0 .
CIVL3612/9612 - Mid-Semester Exam
4
Q4
Potential flow over a half-body
(20 points)
The bottom of a river has a 4 m high bump that approximates a Rankine half-body, as in the figure. The pressure at point B on the bottom is 130 kPa, and the river velocity is 2.5 m/s. Use inviscid theory equations provided, estimate the pressure at point A on the bump, which is 2 m high in elevation. For water at 20◦ C, ρ = 998 kg/m3 .
OR
Determine velocity profile An infinitely long, solid, vertical cylinder of radius R is located in an infinite mass of viscous incompressible fluid. Consider the flow in which the cylinder is rotating about a fixed axis with constant angular velocity, ω . Neglect body forces and assume that the flow is axisymmetric.
CIVL 3612/9612 - Fluid Mechanics, Semester 1 2016 Mid-Semester Exam - TUESDAY Last name First name SID University email Instructions 1. The exam will last 1 hour and 50 minutes, inclusive of 5 minutes reading time. 2. Don’t forget to write your name on this page as well as your student number. 3. This is a closed book exam. You are NOT allowed to bring additional material of any kind. 4. Relevant equations to solve the problems are at the back of this booklet. 5. A standard scientific calculator is permitted. No graphical or programmable calculators are allowed. Similarly, phones, tablets or computers are strictly not allowed. 6. Read the questions carefully and start with the easiest problem. 7. Clearly and neatly show each step of your solution in the space provided. If your final answer is incorrect, you may receive partial points if your method is deemed to be correct. 8. If you have the correct answer without showing each step of your solution, you will receive a mark of zero. 9. Do NOT remove any pages from this booklet. If you need extra pages to write answer, ask a tutor for blank pages. 10. Use FRONT AND BACK of this answer booklet. 11. Good luck. For examiners only: @.au
(a) Simplify the Navier-Stokes equations stating all assumptions clearly (b) State the proper boundary conditions. (c) Derive an expression for the velocity distribution. (d) Determine the only non-zero component of shear stress in this flow. Where is it maximum?
x 2 − a0 γ+1 t
(15 points)
A one-dimensional unsteady flow is given by the following velocity u=
and density field ρ = ρ0 γ−1 x 1 2 + γ + 1 t a0 γ + 1
2 γ −1
5
Q5
Navier-Stokes equations
(25 points)
Determine pressure distribution A two-dimensional flow field for is given as u = Kx, v = −Ky, w = 0, K = constant.
(a) Neglect gravity and show that the velocity field is an exact solution to the incompressible Navier-Stokes equations. (b) Compute the pressure field p(x, y ) and relate it to the absolute velocity V 2 = u2 + v 2 . Interpret the result. (c) Briefly state how your approach to solve this problem will change if gravity is not neglected and z is ‘up’ (gx = 0, gy = 0, gz = −g )? Limit your answer to 2-3 sentences.
Inviscid theory for half-body Stream function = U r sin θ + m θ 2π Half-width = πb b= m 2πU Equation of surface: r = b(π − θ) sin θ
CIVL3612/9612 - Mid-Semester Exam
Determine (1) A and B for f (x, y ) to be a valid velocity potential, i.e. φ = f (x, y ). (2) A and B for f (x, y ) to be a valid stream function, i.e. ψ = f (x, y ). (3) If A = 0 and φ = f (x, y ), sketch at least two distinct streamlines.
CIVL3612/9612 - Mid-Semester Exam
3
Q3
Solve ONLY ONE of the following
(20 points)
Non-dimensional governing equation The Pressure-Poisson Equation (PPE) relating pressure (p) and stream function (ψ ) in a two-dimensional incompressible flow is given as ∂ 2ψ ∂ 2ψ ∇ p = 2ρ − ∂x2 ∂y 2
OR
Froude Number Similarity An open channel with a rectangular cross-section has a 8 m width and 2 m depth with water flowing at 5 m3 /s. A model is designed to discharge 1/1024 that of the prototype. (a) Find width and depth of the model using Froude number similarity. (b) Is Reynolds number similarity achieved for tests in (a) if the working fluid is the same for model and prototype? Why?