精英家教网 > 高中英语 > 题目详情

Random ramblings from a guy who is too busy to have a Web site. On the bright side, you won't find any ads, pop-ups, hype, or any attempts to sell you anything at all. Furthermore, you won't find any pages divided into a hundred little boxes. And the text is so large, you don't need an electron microscope to read it. A refreshing break from reality.  Anyway, here's what I have so far as I gradually resurrect my poor neglected Web site.

PC Survival Camp

Being new to computers, or even just being a “casual user”, isn’t always fun. It's as though everybody on the planet assumes you already know all the buzzwords, and already possess all the skills necessary to use a computer.  Which is a really big assumption, when you consider that nobody was ever born knowing how to use a computer. The links below provide some quick mini-tutorials on all the skills and buzzwords that everyone else seems to assume you already know. Click on any link (underlined text) for a quick mini-lesson. Use the Back button at the bottom of any

page to work your way back to this page.

TechFear Camp

Jargon Camp

Internet Camp

Windows XP Camp

Wrong button!

Hardware

What is the Net?

Desktop

Crash the Internet!

Ports

What's Bandwidth?

Start menu

Erase everything!

KB, megabytes, etc.

What's Download?

Taskbar

Run out of space!

Software

What Web browser?

Quick Launch

Email privacy!

Toolbars

Getting around

Notifications

Viruses!

 

What e-Mail client?

Moving and Sizing

Hackers!

 

Death to pop-ups

Control Panel

 

 

 

More...

If you're looking for Microsoft Access stuff, click here.

l I'm gradually bringing back some of my old HTML stuff here.

l If you have a question, Ask Alan

1.Who is the passage written for?

A.Everyone                             B.College students.

C.Anyone who wants to use a computer.       D.An expert on computers.

2.What’s the advantage of this web site?

A.It’s cheap.                           B.There are no ads.

C.It’s modern.                          D.It provides an electron microscope.

3.You can learn computer skills except_____.

A.Erase everything!   B.Software.          C.Flash .            D.Taskbar.

4.If you have problems, ask____ for help.

A.Coolnerds.com                         B.PC survival Camp

C.Alan                                 D.HTML Stuff

 

【答案】

1.C

2.B

3.C

4.C

【解析】

试题分析:本文中作者为电脑使用者介绍了一个没有广告的网站以及如何操作。

1. 根据Random ramblings from a guy who is too busy to have a Web sit。故选C。

2.根据On the bright side, you won't find any ads, pop-ups, hype, or any attempts to sell you anything at all.故选B。

3.根据page to work your way back to this page的这个图表,故选C。

4.根据If you have a question, Ask Alan ,故选C。

考点:本题是一篇信息寻找类阅读理解。

点评:先阅读问题,然后带着问题,再读全文,找出答题所需要的依据,完成阅读。这篇文章非常容易,根据问题找到相关问题的段落或句子,便可选出答案。

 

练习册系列答案
相关习题

科目:高中英语 来源:(外研社英语高一必修4) Module 2 课时同步训练 题型:阅读理解


B
Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.
As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.
When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.
But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.
Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.
In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.
This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.
40.Which of the following statements is true according to the passage?
A.It is secure to use your password as long as you hit the Return key.
B.Your personal details is likely to be in danger if you spend more time on the web.
C.Your password will be safe if you have some safeguards.
D.Never allowing your computer to store your passwords will be safe.
41.Which of the following is NOT the reason for the unsafety of a password?
A.It will be stored in RAM.
B.It will be copied onto hard disk.
C.It might not be overwritten.
D.It will disappear as soon as you hit the return key.
42.Tal Garfinkel and his team measured the extent of security of       .
A.simulating the working of a complete computer system
B.tagging sensitive data
C.passing through the system
D.running common software
43  What can be inferred from the passage?
A.The length of the time the information is stored is not limited.
B.The programs can not retain the information.
C.The security problem should be paid more attention to.
D.Some sensitive information has been copied.

查看答案和解析>>

科目:高中英语 来源: 题型:阅读理解

                                B

   Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

       As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

       When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

       But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

       Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

       In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

       This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

40.Which of the following statements is true according to the passage?

       A.It is secure to use your password as long as you hit the Return key.

       B.Your personal details is likely to be in danger if you spend more time on the web.

       C.Your password will be safe if you have some safeguards.

       D.Never allowing your computer to store your passwords will be safe.

41.Which of the following is NOT the reason for the unsafety of a password?

       A.It will be stored in RAM.

       B.It will be copied onto hard disk.

       C.It might not be overwritten.

       D.It will disappear as soon as you hit the return key.

42.Tal Garfinkel and his team measured the extent of security of        .

       A.simulating the working of a complete computer system

       B.tagging sensitive data

       C.passing through the system

       D.running common software

43  What can be inferred from the passage?

       A.The length of the time the information is stored is not limited.

       B.The programs can not retain the information.

       C.The security problem should be paid more attention to.

       D.Some sensitive information has been copied.

查看答案和解析>>

科目:高中英语 来源:0123 月考题 题型:阅读理解

阅读理解。
                                                          Passwords are no safeguards
      Typing your password or credit card number into a computer is a moment's work. But if you think your
personal details disappear as soon as you hit the Return key, think again: they can sit on the computer's hard
disk for years waiting for a hacker (黑客) to take them.
      As people spend more time on the web and hackers become more experienced, the dangers of storing
personal information on computers are growing by the day, security experts say. There are some safe-guards,
such as never allowing your computer to store your passwords. But even that in no guarantee of security.
      When you type in a password, it is stored in random access memory (RAM), where it is held temporarily
until other data overwrites it or the computer is switched off. 
      But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy to prey
(捕获) for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data
stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten-which might
not happen for years.
      Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates (模拟)
the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then
tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common
software that regularly handles passwords or secret personal information, such as Internet Explorer, the
Windows login script and Apache server software.
      In a paper to be presented, they conclude that the programs took no measures to limit the length of time
the information is kept. Some of the tested software even copied the sensitive information, obviously without
restraint (阻拦).
1. What does the passage mainly talk about?
[     ]
A. It's important to set passwords to your computer.
B. Passwords help keep your personal information.
C. It's unsafe to store personal information on computers.
D. There are some safeguards for your personal information.
2. Hackers usually get others' information from _____.
[     ]
A. RAM
B. the hard disk
C. a worm
D. the e-mail
3. Garfinkel and his colleagues created a software tool to _____.
[     ]
A. find out how hackers steal personal information
B. protect personal information from being stolen
C. see how a complete computer system works
D. tag and track sensitive data on the computer
4. Talking about computer safety, which of the following the writer would probably suggest?
[     ]
A. People should stop using computers.
B. Hackers should be heavily punished.
C. Better computer programs are needed.
D. Program developers are to blame.

查看答案和解析>>

科目:高中英语 来源: 题型:阅读理解

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

       As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

       When you type in a password ,it is stored in random access memory(RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

       But every so often ,the computer copies the contents of its RAM onto hard disk ,where it is easy prey for a hacker ,who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM ,the more likely it is to be copied onto the disk ,where it stays until it is overwritten—which might not happen for years.

       Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next ,Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer ,the Windows login script and Apache server software.

       In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained .Some of the tested software even copied the sensitive information ,apparently without restraint.

       This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

1.Which of the following statements is true according to the passage?

       A.It is secure to use your password as long as you hit the Return key.

       B.Your personal details is likely to be in danger if you spend more time on the web.

       C.Your password will be safe if you have some safeguards.

       D.Never allowing your computer to store your passwords will be safe.

2.Which of the following is NOT the reason for the unsafely of a password?

       A.It will be stored in RAM.

       B.It will be copied onto hard disk.

       C.It might not be overwritten.

       D.It will disappear as soon as you hit the return key.

3.Tal Garfinkel and his team measured the extent of security of        .

       A.simulating the working of a complete computer system

       B.tagging sensitive data

       C.passing through the system

       D.running common software

4.What can be inferred from the passage?

       A.The length of the time the information is stored is not limited.

       B.The programs can not retain the information.

       C.The security problem should be paid more attention to.

       D.Some sensitive information has been copied.

查看答案和解析>>

科目:高中英语 来源: 题型:阅读理解

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

  As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

  When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

  But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

  Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

  In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

  This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

1.Which of the following statements is true according to the passage?

  A.It is secure to use your password as long as you hit the Return key.

  B.Your personal details is likely to be in danger if you spend more time on the web.

  C.Your password will be safe if you have some safeguards.

  D.Never allowing your computer to store your passwords will be safe.

2.Which of the following is NOT the reason for the unsafety of a password?

  A.It will be stored in RAM.

  B.It will be copied onto hard disk.

  C.It might not be overwritten.

  D.It will disappear as soon as you hit the return key.

3.Tal Garfinkel and his team measured the extent of security of    .

  A.simulating the working of a complete computer system

  B.tagging sensitive data

  C.passing through the system

  D.running common software

4.What can be inferred from the passage?

  A.The length of the time the information is stored is not limited.

  B.The programs can not retain the information.

  C.The security problem should be paid more attention to.

  D.Some sensitive information has been copied.

 

查看答案和解析>>

同步练习册答案