Questions 1 to 5 are based on the following passage.  Comput

题目
问答题
Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following types of questions are mostly used for checking literal comprehension of the text?

A. Display questions.
B. Rhetorical questions.
C. Evaluation questions.
D. Referential questions.

答案:A
解析:
考查课堂提问的形式。课文理解性问题一般分为三类:展示性问题(display questions)、参阅性问题(referential questions)和评估性问题(evaluation questions)。其中,展示性问题通常被用来检测学生对课文内容的理解程度,就课文中的字词句或者某个重要的细节向学生发问。这种问题的答案通常是唯一的,教师预先知道,学生只需凭借表层理解或是查找课文便能找到的。题干意思是下列哪种类型的问题常用于检查对文章字面意思的理解。故选A。

第2题:

Which of the following is not an interactive activity?

A.Looking at the picture below and discussing the questions with your partner.
B.Listening to the tape again and retelling the story with the filled chart.
C.Discussing the following questions in group.
D.Asking another group to give you some advice on improving your work.

答案:B
解析:
考查互动性活动。“再听一遍录音,并根据已经填好的表格复述听力文章的内容”,这一活动不属于互动性的活动。所以B项错误。

第3题:

The reason why lesson six skips the puzzle questions is that they are associated with the expertise based on the content of a particular subject which is likely irrelevant to a layman.()


参考答案:对

第4题:

By default, which of the following factors determines the spanning-tree path cost?()

  • A、It is the individual link cost based on latency
  • B、It is the sum of the costs based on bandwidth
  • C、It is the total hop count
  • D、It is dynamically determined based on load

正确答案:B

第5题:

Which of the following types of questions are mostly used for checking literal comprehensionof the test


A.Display questions.

B.Rhetorical questions.

C.Evaluation questions.

D.Referential questions.

答案:A
解析:
考查课堂提问的形式。题干意思是下列哪种类型的问题常用于检查对文章字面意思的理解。课文理解性问题一般分为三类:展示性问题(display questions)、参考性问题(referential questions)和评估性问题(evaluation questions)。其中,展示性问题通常被用来检测学生对课文内容的理解程度,就课文中的字词句或者某个重要的细节向学生发问。这种问题的答案通常是唯一的,教师预先知道,学生只需凭借表层理解或是查找课文便能找到的。故选A。

第6题:

Which of the following does not belong to the post-listening activities?

A.Multiple-choice questions.
B.Answering questions.
C.Dietogloss.
D.Listen and tick.

答案:D
解析:
考查听力教学。题千问的是哪一项不属于听后环节的活动,D项“听录音并打钩”属于听中环节的活动。

第7题:

Which of the following types of questions can least elicit students′ ideas


A.Display questions.

B.Divergent questions.

C.Open questions.

D.Evaluation questions.

答案:A
解析:
考查课堂提问的类型。依据不同的分类标准,问题可划分为不同的类型。A项是展示性问题,通常被用来检测学生对课文字面意思的理解。这种问题的答案通常是唯一的。教师预先知道,学生只需凭借表层理解或是查找课文便能找到。B项是发散性问题,指引导学生做出不同回答的问题.通常没有正确或错误的答案。C项是开放性问题,指问题的答案是多种多样的。这类提问有利于培养学生的发散思维,促进学生创新能力的提高。D项是评价性问题.指教师为培养学生的判断力而进行的发问。这类提问让学生阐述观点、评判价值、提出原因。后三种问题都能够很好地激励思维,使学生作深入的延展性回答,丰富答案的变化性,有助于学生的学习。故选A。

第8题:

Questions 59-60 are based on the following information

A hash table With hash function

H1(k)=k mod 13

Is shown below.

Collision is resolved using the hash function H2(k)=(k mod 11)+1

How many key comparisons occur in searching for key 35 in the given hash table?

A.0

B.1

C.2

D.3


正确答案:D

第9题:

Questions 41-43 refer to the following letter.
Memory Map Game
by Riven Learning Co.
Description
For 1-6 players, 5-11 years old Children can ______ their observation and memorization skills with this puzzle that features a colorful picture map of a city

A. cause

B. study

C. practice

D. manufacture

答案:C
解析:

第10题:

Which of the following devices can be installed on individual computers throughout the network?()

  • A、NIPS
  • B、Network-based firewall
  • C、VPN concentrator
  • D、Host-based firewall

正确答案:D

更多相关问题