相關(guān)習(xí)題
 0  42332  42340  42346  42350  42356  42358  42362  42368  42370  42376  42382  42386  42388  42392  42398  42400  42406  42410  42412  42416  42418  42422  42424  42426  42427  42428  42430  42431  42432  42434  42436  42440  42442  42446  42448  42452  42458  42460  42466  42470  42472  42476  42482  42488  42490  42496  42500  42502  42508  42512  42518  42526  151629 

科目: 來(lái)源: 題型:

What he has done is far from___________.

A. satisfactory    B. satisfied    C. satisfaction    D. satisfy

 

查看答案和解析>>

科目: 來(lái)源: 題型:

—Do you know about the accident which happened in the center of the city?

  —Yes. But it was some time      we realized the truth.

  A.before    B.when     C.since    D.until

 

查看答案和解析>>

科目: 來(lái)源: 題型:

We are quite ______ to our parents and our teacher alike.

  A.respectable B.respectful C.respective  D.respected

 

查看答案和解析>>

科目: 來(lái)源: 題型:閱讀理解

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

  As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

  When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

  But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

  Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

  In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

  This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

1.Which of the following statements is true according to the passage?

  A.It is secure to use your password as long as you hit the Return key.

  B.Your personal details is likely to be in danger if you spend more time on the web.

  C.Your password will be safe if you have some safeguards.

  D.Never allowing your computer to store your passwords will be safe.

2.Which of the following is NOT the reason for the unsafety of a password?

  A.It will be stored in RAM.

  B.It will be copied onto hard disk.

  C.It might not be overwritten.

  D.It will disappear as soon as you hit the return key.

3.Tal Garfinkel and his team measured the extent of security of    .

  A.simulating the working of a complete computer system

  B.tagging sensitive data

  C.passing through the system

  D.running common software

4.What can be inferred from the passage?

  A.The length of the time the information is stored is not limited.

  B.The programs can not retain the information.

  C.The security problem should be paid more attention to.

  D.Some sensitive information has been copied.

 

查看答案和解析>>

科目: 來(lái)源: 題型:

______________ speaking, I didn’t do it on purpose.

A. Honestly    B. Honest   C. Honesty  D. Dishonest

 

查看答案和解析>>

科目: 來(lái)源: 題型:

If the sunlight is b    out, it will take more time for the clothes to dry.

 

查看答案和解析>>

科目: 來(lái)源: 題型:

She had no money ___a birthday present for her children.

  A.to buy with   B.buying   C.bought   D.with which to buy

查看答案和解析>>

科目: 來(lái)源: 題型:

He has ______ his fortune many times since he began to deal in second-hand car business.

A. added to      B. created      C. multiplied      D. risen

 

查看答案和解析>>

科目: 來(lái)源: 題型:

My friends, after they heard what had happened to me, _____ said it sounded like an adventure.

  A.a(chǎn)ll     B.that     C.which    D.who

 

查看答案和解析>>

科目: 來(lái)源: 題型:

--- How are you getting on with your business?

--- I’m glad to say it is _____.

A. adding up    B. breaking up   C. turning up   D. picking up

 

查看答案和解析>>

同步練習(xí)冊(cè)答案