5.fiction A.suggetion B.separation C.question D.collsion 第二节 语法和词汇知识(共15小题,每小题l分.满分l5分) 从A.B.C.D四个选项中.选出可以填人空白处的最佳选项. 查看更多

 

题目列表(包括答案和解析)

从A、B、C、D四个选项中,选出其画线部分与所给单词的画线部分读音相同的选项。

fiction

[  ]

A.official
B.agency
C.economic
D.century

查看答案和解析>>

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

71. According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen 

B.depended on wireless computer networks

C.were exposed to drive-by hacking   

D.were unaware of the risk of wireless hacking

72.Which of the following is NOT considered in the study?

A.The number of computer hacking incidents.

B.The number of wireless computer networks identified.

C.The way in which data are sent and received.

D.The way in which data are hacked and stolen.

73.Most wireless network technology has_________.

A.data encryption program   B. password security programs

C.illegal-user detection D. firewall

74.  Raymond Kruck most probably agrees that wireless network security involves ________.

A. wireless signal administration  B. changes in user’s awareness

C. users’ psychological health D. stronger physical walls

75.  The passage is most likely to be seen in a __________

A. book review  B. science fiction  C. textbook  D. computer magazine     

       

查看答案和解析>>

完形填空(Cloze Test)

  Jules Verne(1828-1905), French writer and pioneer of science fiction,   1   best known works today   2   Twenty Thousand Leagues Under the Sea(1870)and Around the World in Eighty Days(1873).

  Jules Gabriel Verne was born   3   February 8, 1828, in Nantes, France.His parents were of a seafaring(水手工作的)tradition, a factor which   4   his writings.As a boy, Jules Verne   5   to be a cabin boy on a merchant ship, but he   6   and returned to his parents.In 1847 Jules was sent to study law in Paris.While there, however, his passion(激情)  7   the theatre grew.Later in 1850, Jules Verne's first play   8  .His father was outraged(愤怒)when he heard that Jules   9   to continue law, so he discontinued the money he was giving him to   10   his expenses in Paris.This forced Verne to make money by selling his stories.

  After spending many hours in Paris libraries   11   geology, engineering, and astronomy, Jules Verne published his first novel Five Weeks in a Balloon(1863).Soon he started writing novels   12   Journey to the Center of the Earth(1864), From the Earth to the Moon(1866), and Twenty Thousand Leagues Under the Sea(1873).  13   the popularity of these and other novels, Jules Verne became a very rich man.In 1876, he bought a large yacht and   14   around Europe.His last novel The Invasion of the Sea   15   in 1905.Jules Verne died in the city of Amines on March 24, 1905.

  Jules Verne wrote over 80 books   16  .He was an   17   writer who predicted the science future of the world.Some of the inventions he imagined were created later in his lifetime, but some are still to   18  .He was popular   19   all kinds of readers:rich, poor, young, old, scientists, artists and rulers.His works   20   translated into many languages.We all respect him and remember him forever.

(1)

[  ]

A.

who

B.

whose

C.

of whom

D.

whom

(2)

[  ]

A.

are

B.

is

C.

was

D.

were

(3)

[  ]

A.

in

B.

on

C.

at

D.

for

(4)

[  ]

A.

influence

B.

influences

C.

was influenced

D.

influenced

(5)

[  ]

A.

ran away

B.

ran after

C.

ran out of

D.

ran off

(6)

[  ]

A.

caught

B.

was caught

C.

has caught

D.

had caught

(7)

[  ]

A.

in

B.

on

C.

for

D.

at

(8)

[  ]

A.

published

B.

has published

C.

was published

D.

was publishing

(9)

[  ]

A.

was about

B.

was going

C.

was not going

D.

is not going

(10)

[  ]

A.

pay off

B.

pay back

C.

pay up

D.

pay for

(11)

[  ]

A.

studying

B.

study

C.

to study

D.

studied

(12)

[  ]

A.

for example

B.

such as

C.

for instance

D.

like

(13)

[  ]

A.

Because of

B.

Thanks to

C.

For

D.

Through

(14)

[  ]

A.

sailing

B.

sail

C.

to sail

D.

sailed

(15)

[  ]

A.

has appeared

B.

is appeared

C.

was appeared

D.

appeared

(16)

[  ]

A.

in his life

B.

in the life

C.

all his life

D.

for his life

(17)

[  ]

A.

amazing

B.

amazed

C.

amaze

D.

amazement

(18)

[  ]

A.

have invented

B.

be invented

C.

invent

D.

have been invented

(19)

[  ]

A.

for

B.

to

C.

with

D.

in

(20)

[  ]

A.

has been

B.

is

C.

have been

D.

has

查看答案和解析>>

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

71. According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A. had most of their company data stolen 

B. depended on wireless computer networks

C. were exposed to drive-by hacking   

D. were unaware of the risk of wireless hacking

72.Which of the following is NOT considered in the study?

A.The number of computer hacking incidents.

B.The number of wireless computer networks identified.

C.The way in which data are sent and received.

D.The way in which data are hacked and stolen.

73.Most wireless network technology has_________.

A.data encryption program   B. password security programs

C.illegal-user detection D. firewall

74.  Raymond Kruck most probably agrees that wireless network security involves ________.

A. wireless signal administration  B. changes in user’s awareness

C. users’ psychological health D. stronger physical walls

75.  The passage is most likely to be seen in a __________

A. book review  B. science fiction  C. textbook  D. computer magazine 

查看答案和解析>>

完形填空

  Among the most popular books being written today are those which are usually classified as science fiction.Hundreds of   1   are published every year and are read by all kinds of people.  2   some of the most successful films of recent years have been   3   on science fiction stories.

  It is often thought that science fiction is a fairly new   4   in literature   5   its ancestors can be found in books written hundreds of years ago.These books often   6   the presentation of some form of ideal   7  -a theme(主题)which is   8   often found in modern stories.

  Most of the classics(名著)of science fiction   9   have been written within the last one hundred   10  .Books by writers such as Jules Verne and H.G.Wells to   11   just two well-known authors have been translated into many languages.  12   science fiction writers don’t write about men   13   Mars or space adventure stories.They are   14   interested in predicting the effect of technical progress   15   society and the human mind, or in   16   future worlds which are a reflection of the world   17   we live in now.

    18  of this their writing has obvious political undertones(含意).In an age when scientific fact frequently   19   science fiction the writers may find it difficult to keep   20   of scientific advances.

(1)

[  ]

A.

styles

B.

titles

C.

subjects

D.

topics

(2)

[  ]

A.

Furthermore

B.

Otherwise

C.

Anyway

D.

Clearly

(3)

[  ]

A.

made

B.

depended

C.

based

D.

focused

(4)

[  ]

A.

progress

B.

result

C.

product

D.

development

(5)

[  ]

A.

as

B.

when

C.

but

D.

if

(6)

[  ]

A.

looked for

B.

cared for

C.

asked for

D.

called for

(7)

[  ]

A.

society

B.

idea

C.

future

D.

end

(8)

[  ]

A.

yet

B.

still

C.

even

D.

already

(9)

[  ]

A.

besides

B.

therefore

C.

however

D.

moreover

(10)

[  ]

A.

years

B.

centuries

C.

months

D.

days

(11)

[  ]

A.

introduce

B.

mention

C.

tell

D.

remind

(12)

[  ]

A.

Ancient

B.

Former

C.

Past

D.

Modern

(13)

[  ]

A.

with

B.

during

C.

without

D.

from

(14)

[  ]

A.

still

B.

more

C.

less

D.

even

(15)

[  ]

A.

of

B.

on

C.

in

D.

at

(16)

[  ]

A.

recognizing

B.

imagining

C.

remembering

D.

changing

(17)

[  ]

A.

where

B.

which

C.

there

D.

that

(18)

[  ]

A.

Despite

B.

Instead

C.

Because

D.

In the front

(19)

[  ]

A.

passes on to

B.

gets close to

C.

catches up with

D.

breaks away from

(20)

[  ]

A.

records

B.

out

C.

earlier

D.

ahead

查看答案和解析>>


同步练习册答案