日日人人_亚洲美女在线视频_av手机在线播放_国产大片aaa_欧美中文日韩_午夜理伦三级

精英家教網 > 高中英語 > 題目詳情

If you          talk about it with me,please wait till I finish my work at hand.

A.can

B.may

C.must

D.should

 

【答案】

C

【解析】考查情態動詞。句意:如果你偏要和我談論這件事,請等我完成手頭的工作。此處must表示“偏要,一定要”。

 

練習冊系列答案
相關習題

科目:高中英語 來源: 題型:閱讀理解

Every country had its heroes. The heroes are the people that nation and especially the young peo??ple 21_____ . If you get a list of the 22   _____of a nation, it will tell you the potential (潛力)of the nation.

If today in America ’ you ask the high school students to list their heroes their 23____ would prob??ably divide into three groups. rHie first group of heroes would be the rock stars—the people 24 _____with rock music. There is no doubt that such people do have talent (天才)but one 25_____ if one should hold up rock stars as model. The rock stars too often are mixed with drugs and their personal life isnot all that — 26 ____  . The rock stars are rich and wear the latest fashion styles (時裝).However oneshould 27 _____more in a hero than such things as 28______ and fine clothes.

A second type of heroes for the American youth are sports stars. Again you have a person who has a great talent in one area_ 29 _____. However, too often the personal life of the sports star is a bit 30_____. Too frequently drugs and drinking are a part of 31_____ of the sports stars.

A third group of heroes are TV or movie stars. These people may have lots of 32___ ,tal??ent and are quite handsome. However ’ the personal life of too many actors is quite sad and should not be held up as a 33____  for young people.

Today,the rock stars,the sportsmen  and the actors 34____ have become the models of the youth in America. Really,do you hear a young person say that his 35____ is a doctor, a teacher or a scientist? These people are not 36____ and do not wear fashionable clothes. However, they are 37____ people who work hard to make the world a better place for everyone.

What is really sad is that the young try to 38____ their heroes. They like to wear the same clothes as theirs, if the heroes of today for the American youth are 39 ____only to rock stars, sportsmen and actors, the future does not look too 40_____ .

A.

dislike

B.

admire

C. hate

D.

satisfy

A.

doctors

B.

soldiers

C. teachers

D.

heroes

A.

choice

B.

conclusion

C. answer

D.

questions

A.

interested

P.

connected

C. excited

D.

pleased

A.

wants

B.

hopes

C. wonders

D.

expects

A.

bad

B.

simple

C. silent

D.

good

A.

gather

B.

spend

C. put

D.

be after

A.

paper

B.

money

C. food

D.

book

A.

sports

B.

music

C. movie

D.

teaching

A.

regular

B.

disorder

C. happy

D.

hard

查看答案和解析>>

科目:高中英語 來源:2010--2011學年四川省雅安市高一上學期期末考試英語卷 題型:完型填空

Every country had its heroes. The heroes are the people that nation and especially the young peo­ple 21_____ . If you get a list of the 22   _____of a nation, it will tell you the potential (潛力)of the nation.
If today in America ’ you ask the high school students to list their heroes their 23____ would prob­ably divide into three groups. rHie first group of heroes would be the rock stars—the people 24 _____with rock music. There is no doubt that such people do have talent (天才)but one 25_____ if one should hold up rock stars as model. The rock stars too often are mixed with drugs and their personal life isnot all that — 26 ____  . The rock stars are rich and wear the latest fashion styles (時裝).However oneshould 27 _____more in a hero than such things as 28______ and fine clothes.
A second type of heroes for the American youth are sports stars. Again you have a person who has a great talent in one area_ 29 _____. However, too often the personal life of the sports star is a bit 30_____. Too frequently drugs and drinking are a part of 31_____ of the sports stars.
A third group of heroes are TV or movie stars. These people may have lots of 32___ ,tal­ent and are quite handsome. However ’ the personal life of too many actors is quite sad and should not be held up as a 33____  for young people.
Today,the rock stars,the sportsmen  and the actors 34____ have become the models of the youth in America. Really,do you hear a young person say that his 35____ is a doctor, a teacher or a scientist? These people are not 36____ and do not wear fashionable clothes. However, they are 37____ people who work hard to make the world a better place for everyone.
What is really sad is that the young try to 38____ their heroes. They like to wear the same clothes as theirs, if the heroes of today for the American youth are 39 ____only to rock stars, sportsmen and actors, the future does not look too 40_____ .

【小題1】
A.dislikeB.admireC.hateD.satisfy
【小題2】
A.doctorsB.soldiersC.teachersD.heroes
【小題3】
A.choiceB.conclusionC.answerD.questions
【小題4】
A.interestedB.connectedC.excitedD.pleased
【小題5】
A.wantsB.hopesC.wondersD.expects
【小題6】
A.badB.simpleC.silentD.good
【小題7】
A.gatherB.spendC.putD.be after
【小題8】
A.paperB.moneyC.foodD.book
【小題9】
A.sportsB.musicC.movieD.teaching
【小題10】
A.regularB.disorderC.happyD.hard
【小題11】
A.sportsB.lifeC.clothesD.talent
【小題12】
A.teachingB.runningC.actingD.pretending
【小題13】
A.modelB.exampleC.lessorD.education
【小題14】
A.bothB.eachC.allD.none
【小題15】
A.parentB.husbandC.wifeD.hero
【小題16】
A.richB.poorC.healthyD.kind
【小題17】
A.stupidB.talentedC.terribleD.weak
【小題18】
A.persuadeB.praiseC.rememberD.follow
【小題19】
A.enoughB.limitedC.powerfulD.great
【小題20】
A.brightB.usualC.necessaryD.important

查看答案和解析>>

科目:高中英語 來源:(外研社英語高一必修4) Module 2 課時同步訓練 題型:閱讀理解


B
Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.
As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.
When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.
But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.
Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.
In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.
This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.
40.Which of the following statements is true according to the passage?
A.It is secure to use your password as long as you hit the Return key.
B.Your personal details is likely to be in danger if you spend more time on the web.
C.Your password will be safe if you have some safeguards.
D.Never allowing your computer to store your passwords will be safe.
41.Which of the following is NOT the reason for the unsafety of a password?
A.It will be stored in RAM.
B.It will be copied onto hard disk.
C.It might not be overwritten.
D.It will disappear as soon as you hit the return key.
42.Tal Garfinkel and his team measured the extent of security of       .
A.simulating the working of a complete computer system
B.tagging sensitive data
C.passing through the system
D.running common software
43  What can be inferred from the passage?
A.The length of the time the information is stored is not limited.
B.The programs can not retain the information.
C.The security problem should be paid more attention to.
D.Some sensitive information has been copied.

查看答案和解析>>

科目:高中英語 來源:20102011學年四川省雅安市一年級上期期末檢測英語試題 題型:完型填空

Every country had its heroes. The heroes are the people that nation and especially the young peo­ple 21_____ . If you get a list of the 22   _____of a nation, it will tell you the potential (潛力)of the nation.

If today in America ’ you ask the high school students to list their heroes their 23____ would prob­ably divide into three groups. rHie first group of heroes would be the rock stars—the people 24 _____with rock music. There is no doubt that such people do have talent (天才)but one 25_____ if one should hold up rock stars as model. The rock stars too often are mixed with drugs and their personal life isnot all that — 26 ____  . The rock stars are rich and wear the latest fashion styles (時裝).However oneshould 27 _____more in a hero than such things as 28______ and fine clothes.

A second type of heroes for the American youth are sports stars. Again you have a person who has a great talent in one area_ 29 _____. However, too often the personal life of the sports star is a bit 30_____. Too frequently drugs and drinking are a part of 31_____ of the sports stars.

A third group of heroes are TV or movie stars. These people may have lots of 32___ ,tal­ent and are quite handsome. However ’ the personal life of too many actors is quite sad and should not be held up as a 33____  for young people.

Today,the rock stars,the sportsmen  and the actors 34____ have become the models of the youth in America. Really,do you hear a young person say that his 35____ is a doctor, a teacher or a scientist? These people are not 36____ and do not wear fashionable clothes. However, they are 37____ people who work hard to make the world a better place for everyone.

What is really sad is that the young try to 38____ their heroes. They like to wear the same clothes as theirs, if the heroes of today for the American youth are 39 ____only to rock stars, sportsmen and actors, the future does not look too 40_____ .

1.

A.

dislike

B.

admire

C.hate

D.

satisfy

2.

A.

doctors

B.

soldiers

C.teachers

D.

heroes

3.

A.

choice

B.

conclusion

C.answer

D.

questions

4.

A.

interested

P.

connected

C. excited

D.

pleased

5.

A.

wants

B.

hopes

C.wonders

D.

expects

6.

A.

bad

B.

simple

C.silent

D.

good

7.

A.

gather

B.

spend

C.put

D.

be after

8.

A.

paper

B.

money

C.food

D.

book

9.

A.

sports

B.

music

C.movie

D.

teaching

10.

A.

regular

B.

disorder

C.happy

D.

hard

11.

A.

sports

 

B.

life

 

C.clothes

D.talent

12.

A.

teaching

 

B.

running

 

C.acting

D.pretending

13.

A.

model

 

B.

example

 

C.lessor

D.education

14.

A.

both

 

B.

each

 

C.all

D.none

15.

A.

parent

B.

husband

C    wife       D. hero

16.

A.

rich

 

B.

poor

 

C.healthy

D.kind

17.

A.

stupid

 

B.

talented

 

C.terrible

D.weak

18.

A.

persuade

 

B.

praise

 

C.remember

D.follow

19..

A.

enough

 

B.

limited

 

C.powerful

D.great

20.

A.

bright

 

B.

usual

 

C.necessary

D.important

 

查看答案和解析>>

科目:高中英語 來源: 題型:閱讀理解

                                B

   Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

       As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

       When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

       But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

       Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

       In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

       This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

40.Which of the following statements is true according to the passage?

       A.It is secure to use your password as long as you hit the Return key.

       B.Your personal details is likely to be in danger if you spend more time on the web.

       C.Your password will be safe if you have some safeguards.

       D.Never allowing your computer to store your passwords will be safe.

41.Which of the following is NOT the reason for the unsafety of a password?

       A.It will be stored in RAM.

       B.It will be copied onto hard disk.

       C.It might not be overwritten.

       D.It will disappear as soon as you hit the return key.

42.Tal Garfinkel and his team measured the extent of security of        .

       A.simulating the working of a complete computer system

       B.tagging sensitive data

       C.passing through the system

       D.running common software

43  What can be inferred from the passage?

       A.The length of the time the information is stored is not limited.

       B.The programs can not retain the information.

       C.The security problem should be paid more attention to.

       D.Some sensitive information has been copied.

查看答案和解析>>

同步練習冊答案
主站蜘蛛池模板: 久久精品亚洲a | 97综合色 | 成人网电影 | 99这里只有精品视频 | 在线观看欧美一区 | 日韩一区二区三区免费视频 | 毛片视频网站 | 亚洲欧美91| 91豆花视频| 91爱爱视频 | 久久综合狠狠综合久久综合88 | 日韩精品一区二区三区中文在线 | 亚洲福利一区 | 国内精品久久久久久影视8 久久亚洲精品国产一区最新章节 | 一本大道久久a久久精二百 羞羞视频在线观免费观看 国产第一区在线观看 | 久久一区二区视频 | 欧美a级成人淫片免费看 | 羞羞视频在线免费 | 日本1区2区 | 一区二区三区视频免费在线观看 | 国产精品一二三区 | av大片在线 | 欧美一区二区在线 | 久久国产一区二区 | 日韩一级免费在线观看 | 国产精品99久久免费观看 | 白浆在线 | 国产剧情一区二区 | 亚洲视频在线观看网址 | 91精品国产一区二区三区 | 国产高清在线精品一区二区三区 | 男人天堂视频网 | 国产精品久久久久久久免费大片 | 午夜精品久久久久久久久久久久 | 国产精品久久久久一区二区三区 | 日本污视频在线观看 | 老妇激情毛片免费 | 久久精品色欧美aⅴ一区二区 | 国产精品高颜值在线观看 | 日本三级国产 | 91精品国产91久久久久久久久久久久 |