皮皮学,免费搜题
登录
搜题
【简答题】
People tend to think of computers as isolated machines, working away all by themselves. Some personal computers do without an outside link, like someone's secret cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community local, national and even global network joined by telephone connections. The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue (流氓) loose in a computer system called hacker is worse than a thief entering your house. He could go through anyone's electronic mail or add to, change or delete anything in the information stored in the computer's memory. He could even take control of the entire system by inserting his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there. Hacking, our electronic-age term for computer break-in is more and more in the news, intelligent kids vandalizing(破坏)university records, even pranking (恶作剧) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from some files; A student sends out a 'virus', a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Destroging a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to strengthen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication, the main reason for using computers in the first place. 59. People usually regard computers as      . A. a small cabin at the end of a street B. part of a network C. means of exchanging intelligence D. personal machines disconnected from outside 60. The writer mentions “ a thief ”in the second paragraph most probably to      . A. look into the case where hackers and thieves are the same people B. demand that a computer network should be set up against thieves C. tell people that thieves like to steal computers nowadays D. show that a hacker is more dangerous than a thief 61. According to the passage , a hacker may do all the damages below EXCEPT     . A. destroying computer systems . B. creating many electronic-age terms . C.. entering into computer systems without being discovered D. attacking people’s e-mails 62. By saying “ Now exists the possibility of terrorism by computer ”(the underlined ) the writer means that     . A. students who send out a “ virus ”may do disastrous damages to thousands of computers B. some people may spread fear in public by destroying computer systems C. some employees may erase information from some files D. some terrorists are trying to contact each other using electronic mails
拍照语音搜题,微信中搜索"皮皮学"使用
参考答案:
参考解析:
知识点:
.
..
皮皮学刷刷变学霸
举一反三
【简答题】The ______ (operate) of the machine is easy.
【单选题】下列中国名花与其美称对应正确的是:
A.
牡丹——花魁
B.
杜鹃——花中君子
C.
月季——花中皇后
D.
荷花——凌波仙子
【简答题】普通单开道岔由哪几部分组成?
【单选题】下列由中国名花与其美称对应正确的是:( )
A.
牡丹-花魁
B.
杜鹃-花中君子
C.
荷花-凌波仙子
D.
月季-花中皇后
【单选题】The machine is easy to ______. All you need to do is just push this button.
A.
operate
B.
be operated
C.
being operated
D.
operating
【多选题】下列名花对应正确的是( )。
A.
梅花——坚贞不屈、高洁
B.
牡丹——富贵吉祥、繁荣幸福
C.
菊花——清丽高洁、高风亮节
D.
月季——永远胜利
E.
杜鹃——高雅、圣洁
【单选题】不少作家的书名是从前人的佳辞名句化用而来的。下列对应不正确的是:
A.
袁枚《子不语》—《论语》
B.
琼瑶《在水一方》—屈原《离骚》
C.
茅盾《霜叶红于二月花》—杜牧《山行》
D.
安意如《人生若只如初见》一纳兰性德《木兰花令·拟古决绝词》
【多选题】下列名著与人物对应正确的是( )。
A.
《家》:钱梅芬、李瑞珏、琴、淑华、淑英
B.
《骆驼祥子》:曹先生、曹太太、高妈、杨太太
C.
《边城》:王团总、天保、傩送、杨马兵
D.
《菉竹山房》:二姑姑、阿圆、兰花
E.
《断魂枪》:沙子龙、王三胜、孙老者、小顺们
【单选题】The machine is easy to _______if you follow the instructions.
A.
be operated
B.
operate
C.
be operated on
D.
operate on
【单选题】近代以来人类的技术发展过程与古代不同。古代技术发展只是偶发事件,如火药、指南针等,尽管在军事史上产生过重大影响,由于结构简单,后续没有重大改进。而近代技术则不然,从织布机到蒸汽机,进而到内燃机、电动机,技术的进步是连续的,也是一个可期待的线性过程,因此可瞄准未来,进行过程上的超前式跨越。如钱学森在中国基础工业非常薄弱的情况下,就主张重点发展导弹而不是飞机;美国在人造地球卫星和载人航天落后于苏联的情...
A.
跨越式发展是抢占技术发展先机的前提
B.
现代技术发展的路径与古代有本质的区别
C.
勇气和魄力是支持跨越式发展的精神品质
D.
对技术改进的无限追求才能实现跨越式发展
相关题目: