Do you want to be a computer 查看更多

 

题目列表(包括答案和解析)

用所给单词的适当形式填空

Do you want to be a computer ________ (program) ?

查看答案和解析>>

完形填空

How do we give a computer instructions?

  We give a computer instructions   1   putting a program into it.The program is   2   a human being, and it is essential that the human does not make a mistake.If we want a computer to do different jobs, we   3   give it different programs.

Is a computer cleverer than I am?

  The answer   4   this question is, for the time being,‘No’.Your brain can understand the meaning of things better and create new ideas.  5  , one day computers may be able to do most things that a human brain can do and do them better.They may be better than doctors, judges and teachers at doing their jobs.

  If this is true, it   6   interesting questions.What will happen   7   us if computers can do our jobs?How will we spend our lives? Will we have nothing to do? Computers may change our lives.But will they make   8   better?

CD-ROMs

  Many of today's computers have CD-ROM drives.A CD-ROM can hold over 300,000 pages of writing, and can also contain pictures and sound.Thus,   9  , you can use your computer to read about a famous person in history such as John F Kennedy, and you can see a photograph or video of him, and even listen to him speaking.Some people think that CD-ROMs will   10   be more popular than books.

(1)

[  ]

A.

through

B.

by

C.

with

D.

from

(2)

[  ]

A.

written to

B.

written by

C.

wrote by

D.

writing to

(3)

[  ]

A.

need

B.

can

C.

may

D.

have to

(4)

[  ]

A.

for

B.

to

C.

of

D.

about

(5)

[  ]

A.

However

B.

Thus

C.

Therefore

D.

Then

(6)

[  ]

A.

asks

B.

gives

C.

rises

D.

raises

(7)

[  ]

A.

on

B.

for

C.

to

D.

by

(8)

[  ]

A.

it

B.

them

C.

that

D.

those

(9)

[  ]

A.

such as

B.

for example

C.

like

D.

as

(10)

[  ]

A.

fast

B.

quick

C.

soon

D.

quickly

查看答案和解析>>

Do you believe that there might be life on other planets? Would you like to be the first “Earthling” to get in touch with an alien? Well, you can start your search from home. All you need is a  computer and the Internet, and you can join the project of the US-based  National Aeronautics and Space Administration(NASA).

   NASA started the Search for Extra-Terrestrial Intelligence (SETI) project eight years ago. Its goal is to examine the radio signals (信号) from nearby stars. Researchers believe that a large number of stars in the universe could have planets orbiting (circling) around them. And they want to know if these planets have conditions suitable for life forms.

   How does the project work? There is a huge radio telescope with a large bowl-shaped dish at Arecibo, Puerto Rico. It catches radio signals which are then fed in to SETI computers. The researchers have to study thousands of radio signals daily. They are looking for signals whose patterns (模式)would show the existence(存在)of hydrogen or water molecules that are necessary for life on Earth. They could be at it for years before showing a single positive result!

   Of course, even the researchers know that they cannot do a fast job on their own. So they want as many helpers as possible. Even you ! To join search, just download SETI’s free software (SETI @home). What happens next is fun. While you are away from your computer, the SETI program in your computer downloads the information on radio signals received by the radio telescope. It studies the information and send the result back to the research center.

   There are other benefits too of having the SETI project software in your computer. When you leave your computer unattended, instead of seeing the usual screen saver, you can feast your eyes on an amazing 3-D chart on the screen. This shows that your computer is busy studying SETI data and searching for signs of alien life!

   More than 1824500 people around the world are currently in the program and more are joining in every day. It’s slim chance, but wouldn’t it be fantastic if your computer were to be the first to discover an alien signal!

53. Why do researchers examine the radio signals from nearby stars?

A. They plan to help people who live on the stars.       

B. They need to make sure that the stars have planets.      

C. They have to keep in touch with the aliens on the stars.      

D. They wonder if the stars’ planets are suitable for life forms.

54. What does a helper’s computer do in the research?

A. It finds the radio signals.        B. It looks for other planets.      

C. It shows a positive result.        D. It studies the information.

55. What’s the writer’s purpose in writing the passage?

A. To prove the value of a research.        B. To invite people to join a project.       

C. To suggest the existence of aliens.       D. To advise people to study planets.

查看答案和解析>>

E-mail is one of the biggest threats(威胁)to your home computer. By understanding how E-mail works, and by taking some steps in how you deal with reading and writing messages, you can keep this threat out of your computer. When you exchange E-mail with someone else, the messages sent between you and that person pass through several computers before they reach their places. Imagine this conversation as it is taking place in an Internet“room”, a very, very big room. Anyone, or more exactly, any program can probably understand what is being said, because most Internet conversations are not hidden(隐藏)in any way. As a result, others may be listening in, capturing what you send, and using it for their own good.

 

    E-mail-borne viruses(病毒)often arrive in attractive, fantastic appearances, much like the beautiful ads we receive by way of traditional mail that is made to sell us something. By beautiful appearances, an infected(感染)E-mail message seems to be something we want to read from someone we know, not a mean virus ready to destroy or damage our computers.

    There are some steps that you can take to help you decide what to do with every E-mail message with an attachment(附件)that you receive. You should only read a message that passes all of these tests:

    1)The Know Test: Is the E-mail from someone that you know?

    2)The Received Test: Have you received E-mail from this sender before?

    3)The Expect Test: Were you waiting for E-mail with an attachment from this sender?

    4)The Meaning Test: Do the topic line of the E-mail massage and the name of the attachment both have meanings?

    5)The Virus Test: Is the E-mail infected?

1. Which of the following is the main idea of the first paragraph?

    A. We should not exchange our E-mail with someone else.

    B. It is dangerous to read and write E-mail message sat home.

    C. We should learn how E-mail works to take care of our computers.

    D. Our chats on computers are usually going on in a big Internet room.

2. What does the underlined word“capturing”probably mean?

    A. taking               B. hiding         C. receiving           D. destroying

3. As the Internet is open to anyone, we should ___________.

    A. not read and write messages in our home computers

    B. not allow nice advertisements to reach our computers

    C. stop our conversations while someone is listening in it

    D. be careful with the attractive E-mails sent by strangers

4. What is the passage mainly talking about?

A. The threats of E-mail.

B. The safety of home computers.

C. The E-mail-borne viruses.

D. The steps to receive E-mail messages

查看答案和解析>>

  E-mail is one of the biggest threats(威胁)to your home computer.By understanding how E-mail works, and by taking some steps in how you deal with reading and writing messages, you can keep this threat out of your computer.When you exchange E-mail with someone else, the messages sent between you and that person pass through several computers before they reach their places.Imagine this conversation as it is taking place in an Internet“room”, a very, very big room.Anyone, or more exactly, any program can probably understand what is being said, because most Internet conversations are not hidden(隐藏)in any way.As a result, others may be listening in, capturing what you send, and using it for their own good.

  E-mail-borne viruses(病毒)often arrive in attractive, fantastic appearances, much like the beautiful ads we receive by way of traditional mail that is made to sell us something.By beautiful appearances, an infected(感染)E-mail message seems to be something we want to read from someone we know, not a mean virus ready to destroy or damage our computers.

  There are some steps that you can take to help you decide what to do with every E-mail message with an attachment(附件)that you receive.You should only read a message that passes all of these tests:

  1)The Know Test:Is the E-mail from someone that you know?

  2)The Received Test:Have you received E-mail from this sender before?

  3)The Expect Test:Were you waiting for E-mail with an attachment from this sender?

  4)The Meaning Test:Do the topic line of the E-mail massage and the name of the attachment both have meanings?

  5)The Virus Test:Is the E-mail infected?

(1)

Which of the following is the main idea of the first paragraph?

[  ]

A.

We should not exchange our E-mail with someone else.

B.

It is dangerous to read and write E-mail message sat home.

C.

We should learn how E-mail works to take care of our computers.

D.

Our chats on computers are usually going on in a big Internet room.

(2)

What does the underlined word“capturing”probably mean?

[  ]

A.

taking

B.

hiding

C.

receiving

D.

destroying

(3)

As the Internet is open to anyone, we should ________.

[  ]

A.

not read and write messages in our home computers

B.

not allow nice advertisements to reach our computers

C.

stop our conversations while someone is listening in it

D.

be careful with the attractive E-mails sent by strangers

(4)

What is the passage mainly talking about?

[  ]

A.

The threats of E-mail.

B.

The safety of home computers.

C.

The E-mail-borne viruses.

D.

The steps to receive E-mail messages.

查看答案和解析>>


同步练习册答案