科目: 來源: 題型:閱讀理解
Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.
As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.
When you type in a password ,it is stored in random access memory(RAM), where it is held temporarily until other data overwrites it or the computer is switched off.
But every so often ,the computer copies the contents of its RAM onto hard disk ,where it is easy prey for a hacker ,who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM ,the more likely it is to be copied onto the disk ,where it stays until it is overwritten—which might not happen for years.
Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next ,Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer ,the Windows login script and Apache server software.
In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained .Some of the tested software even copied the sensitive information ,apparently without restraint.
This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.
1.Which of the following statements is true according to the passage?
A.It is secure to use your password as long as you hit the Return key.
B.Your personal details is likely to be in danger if you spend more time on the web.
C.Your password will be safe if you have some safeguards.
D.Never allowing your computer to store your passwords will be safe.
2.Which of the following is NOT the reason for the unsafely of a password?
A.It will be stored in RAM.
B.It will be copied onto hard disk.
C.It might not be overwritten.
D.It will disappear as soon as you hit the return key.
3.Tal Garfinkel and his team measured the extent of security of .
A.simulating the working of a complete computer system
B.tagging sensitive data
C.passing through the system
D.running common software
4.What can be inferred from the passage?
A.The length of the time the information is stored is not limited.
B.The programs can not retain the information.
C.The security problem should be paid more attention to.
D.Some sensitive information has been copied.
查看答案和解析>>
科目: 來源: 題型:
此題要求改正所給短文中的錯誤。對標有題號的每一行作出判斷:如無錯誤,在該行右邊橫線上畫一個勾(√);如有錯誤(每行只有一個錯誤),則按下列情況改正:
此行多一個詞:把多余的詞用斜線(\)劃掉,在該行右邊橫線上寫出該詞,并也用斜線劃掉。
此行缺一個詞:在缺詞處加一個漏字符號(∧),在該行右邊橫線上寫出該加的詞。
此行錯一個詞:在錯的詞下劃一橫線,在該行右邊橫線上寫出改正后的詞。
注意:原行沒有錯的不要改。
Up until I was about 10 years old, I was the same as
everyone else in my class . I used to climb on trees ,swim and 1.______________
play football .In fact , I was used to dream about one day being 2._______________
famous football player and representing my country in the 3.____ _____
World Cup .Then I start to get weaker and weaker .Some days. 4._______________
I was too tired to get out of bed .I went into hospital for tests. 5._______________
I stayed there for nearly three months and missed a lot of schools. 6._______________
I think I had at least a billion tests while I was there ,included 7._______________
one which they cut out a piece of muscle from my leg and looked 8._______________
at it under a microscope . Only after all the tests ,no one could give 9._______________
my disease a name , so it is difficulty to know what the future will be like. 10._______________
查看答案和解析>>
科目: 來源: 題型:
以師生關系為題寫一篇短文,內(nèi)容要點如下:
1.良好的師生關系對教和學兩方面都非常重要。只有師生關系融洽,教師和學生才能合作好。
2.這種理想的師生關系依賴于雙方的共同努力。一方面,學生應該尊重老師,對老師有禮貌,而且隨時聽從老師有益的建議。另一方面,老師也應該善待學生,公平合理地對待每一個學生,沒有優(yōu)劣之分。耐心地解答學生的問題。他們應對教學負責并隨時幫助有困難的學生。
3.如果雙方都友好相處,誤解很容易就消除,課堂效率會非常高。
注意:1.文段須包括所有提示要點,可適當?shù)卦鰷p細節(jié),使內(nèi)容連貫。
2.短文的開頭已給出。
3.詞數(shù)110左右。
Relationship between Teachers and Students
A good relationship between teachers and students is essential to learning as well as teaching.
查看答案和解析>>
科目: 來源: 題型:
Dark clouds are gathering.It _____ rain.
A.will B.is going to C.should D.is to
查看答案和解析>>
科目: 來源: 題型:
We were in ________ when we left that we forgot the airline tickets.
A.a(chǎn) rush so anxious B.a(chǎn) such anxious rush
C.so an anxious rush D.such an anxious rush
查看答案和解析>>
科目: 來源: 題型:
I have _______ for about a month.
A.caught a cold B.had a cold C.have a cold D.catch a cold
查看答案和解析>>
科目: 來源: 題型:
Tom’s car ________ on the way, so when he arrived at the company, the meeting had just ________.
A.broke up; broken down B.broke up; broke up
C.broke down; broke down D.broke down; broken up
查看答案和解析>>
科目: 來源: 題型:
Though I hadn’t seen Jones for five years or so, I ________ her voice as soon as I picked up my phone.
A.recognized B.knew C.realized D.discovered
查看答案和解析>>
科目: 來源: 題型:
Mr. Smith looks very fit.He takes _____ every day.
A.many exercises B.much exercise C.little exercise D.few exercises
查看答案和解析>>
科目: 來源: 題型:
By the time we ________ at the cinema, the film ________.
A.a(chǎn)rrived; began B.had arrived; began
C.a(chǎn)rrived; had begun D.had arrived; had begun
查看答案和解析>>
湖北省互聯(lián)網(wǎng)違法和不良信息舉報平臺 | 網(wǎng)上有害信息舉報專區(qū) | 電信詐騙舉報專區(qū) | 涉歷史虛無主義有害信息舉報專區(qū) | 涉企侵權舉報專區(qū)
違法和不良信息舉報電話:027-86699610 舉報郵箱:58377363@163.com