题目内容

Whichof the following is NOT true according to the passage?

[  ]

A.The Vikings were a group of people whose ancestors came from Scandinavia.

B.The Vikings controlled the seas and coasts of Western Europe between the 8th and 10thcenturies.

C.In 982 AD, there were about 10, 000 Vikings living in Iceland.

D.The Vikings chose to live in many places in Northern Europe by around 900 AD.

练习册系列答案
相关题目

Are you a problem shopper? The answer is “Yes”, if you or someone else thinks that you sometimes get carried away with shopping. In other words, do you or does someone else think you are occupied in extreme shopping? If people have regrets later about their shopping, or have an “out-of-control” feeling about the quantities of what they buy or the amount of credit they use, they may be considered to be problem shoppers.

Extreme shopping can lead to a more serious problem –addictive shopping. Addictive shoppers feel driven by the desire to shop and spend money. They experience great tension which drives them to shop and spend money and they feel a “rush” during the time they are occupied with the shopping activity.

Extreme or addictive shopping may result from long-time unpleasant feelings, of which anxiety, pain and shame are common ones. When we feel bad inside, we often do something to make ourselves feel better. In this case, we often go shopping.

A few people shop to relieve their boredom or emptiness. For some people, the motivation is a desire for status, power, beauty or success. Some love to shop as it makes them feel valued in the eyes of the shop assistants. Others shop simply because it makes them forget, at least temporarily, tension, fear or unhappiness in their life.

Besides, shopping malls are designed to encourage continual shopping. For instance, there are some malls where you can’t see clocks displaying the time because they don’t want you to become too aware of the time you spend there. What’s more, food courts, coffee shops and restrooms are provided, so you don’t have to leave the mall because of your physical needs.

Therefore, once you become aware of how market forces work, you will certainly come to control your shopping behavior. For example, how much time you will spend and what areas you will visit can be decided before you enter the mall. Keep a written account of what items you will buy and how much money you will spend. Make a plan for what you are going to buy before you feel the urge to shop and then stick to it. That is vital for gaining self-control.

Whichof the following people may not be problem shoppers?

A.Those who cannot control the amount of credit they use.

B.Those who just walk around the shopping malls.

C.Those who are occupied in too much shopping.

D.Those who feel sorry for their shopping.

According to the passage, what may not result in addictive shopping?

A.The awareness of how market forces work.

B.The desire for status, power, beauty or success.

C.Boredom, emptiness, tension, fear or unhappiness in people’s life.

D.Long-time bad feelings of anxiety, pain and shame.

How can we control our shopping behavior according to the passage?

A.Never going to the shopping malls because there are many tricks.

B.Applying for a credit card before we go shopping.

C.Making the shopping time as short as possible.

D.Making a shopping list before we go shopping.

The author writes this passage to_______________.     .

A.inform the shopping malls how to attract more shoppers

B.scold the problem shoppers

C.provide solutions for the problem shoppers.

D.tell a shopping story

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
【小题1】According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen
B.depended on wireless computer networks
C.were exposed to drive-by hacking
D.were unaware of the risk of wireless hacking
【小题2】Whichof the following is NOT considered in the study?
A.The number of computer hacking incidents.
B.The number of wireless computer networks identified.
C.The way in which data are sent and received.
D.The way in which data are hacked and stolen.
【小题3】Most wireless network technology has_________.
A.data encryption programB.password security programs
C.illegal-user detectionD.firewall
【小题4】Raymond Kruck most probably agrees that wireless network security involves ________.
A.wireless signal administrationB.changes in user’s awareness
C.users’ psychological healthD.stronger physical walls
【小题5】The passage is most likely to be seen in a __________
A.book reviewB.science fictionC.textbookD.computer magazine

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

1.According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen

B.depended on wireless computer networks

C.were exposed to drive-by hacking

D.were unaware of the risk of wireless hacking

2.Whichof the following is NOT considered in the study?

A.The number of computer hacking incidents.

B.The number of wireless computer networks identified.

C.The way in which data are sent and received.

D.The way in which data are hacked and stolen.

3.Most wireless network technology has_________.

A.data encryption program                 B.password security programs

C.illegal-user detection                    D.firewall

4.Raymond Kruck most probably agrees that wireless network security involves ________.

A.wireless signal administration              B.changes in user’s awareness

C.users’ psychological health              D.stronger physical walls

5.The passage is most likely to be seen in a __________

A.book review       B.science fiction      C.textbook          D.computer magazine

 

Are you a problem shopper? The answer is “Yes”, if you or someone else thinks that you sometimes get carried away with shopping. In other words, do you or does someone else think you are occupied in extreme shopping? If people have regrets later about their shopping, or have an “out-of-control” feeling about the quantities of what they buy or the amount of credit they use, they may be considered to be problem shoppers.

Extreme shopping can lead to a more serious problem –addictive shopping. Addictive shoppers feel driven by the desire to shop and spend money. They experience great tension which drives them to shop and spend money and they feel a “rush” during the time they are occupied with the shopping activity.

Extreme or addictive shopping may result from long-time unpleasant feelings, of which anxiety, pain and shame are common ones. When we feel bad inside, we often do something to make ourselves feel better. In this case, we often go shopping.

A few people shop to relieve their boredom or emptiness. For some people, the motivation is a desire for status, power, beauty or success. Some love to shop as it makes them feel valued in the eyes of the shop assistants. Others shop simply because it makes them forget, at least temporarily, tension, fear or unhappiness in their life.

Besides, shopping malls are designed to encourage continual shopping. For instance, there are some malls where you can’t see clocks displaying the time because they don’t want you to become too aware of the time you spend there. What’s more, food courts, coffee shops and restrooms are provided, so you don’t have to leave the mall because of your physical needs.

Therefore, once you become aware of how market forces work, you will certainly come to control your shopping behavior. For example, how much time you will spend and what areas you will visit can be decided before you enter the mall. Keep a written account of what items you will buy and how much money you will spend. Make a plan for what you are going to buy before you feel the urge to shop and then stick to it. That is vital for gaining self-control.

 

1.Whichof the following people may not be problem shoppers?

A.Those who cannot control the amount of credit they use.

B.Those who just walk around the shopping malls.

C.Those who are occupied in too much shopping.

D.Those who feel sorry for their shopping.

2.According to the passage, what may not result in addictive shopping?

A.The awareness of how market forces work.

B.The desire for status, power, beauty or success.

C.Boredom, emptiness, tension, fear or unhappiness in people’s life.

D.Long-time bad feelings of anxiety, pain and shame.

3.How can we control our shopping behavior according to the passage?

A.Never going to the shopping malls because there are many tricks.

B.Applying for a credit card before we go shopping.

C.Making the shopping time as short as possible.

D.Making a shopping list before we go shopping.

4.The author writes this passage to_______________.     .

A.inform the shopping malls how to attract more shoppers

B.scold the problem shoppers

C.provide solutions for the problem shoppers.

D.tell a shopping story

 

 

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网