第一范文网 - 专业文章范例文档资料分享平台

精选2019-2020年高中英语必修1、2Unit 3 Computers人教版课后练习第五十八篇

来源:用户分享 时间:2025/7/24 21:40:54 本文由loading 分享 下载这篇文档手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

最新教育资料精选

精选2019-2020年高中英语必修1、2Unit 3 Computers人教版课后练习第五十八

第1题【单选题】

Once new difficulties ________ in our new job,we should learn to use our brains to solve them. A、rise B、cause C、raise D、arise 【答案】:

【解析】:

第2题【阅读理解】

阅读下列短文,从每题所给的四个选项(A、B、C或D)中,选出最佳选项

\solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.

Theprogramallows users to display alerts on the missingcomputer\message. Tracking software for stolen laptops has been on the market for some time, but thisis thought to be the first that allows owners to give the thief a piece of their mind.

Owners must report their laptop missing by visiting a website, which sends a message to the model: a red and yellow \版本) of the software, users can also send a spoken message.

The message can be set to reappear every 30 seconds, no matter how many times the thief closes it. \customer sent a message saying, \executive of the comp any which produces the program, Retriever.

In the latest version, people can add a spoken message. For example, the laptop\thislaptop is reported lost or stolen. If you are not my owner, report me now.\

1 / 10

最新教育资料精选

The Retriever software package, which costs $ 29.95 but has a free trial period, has the functions of many security softwareprograms. Owners can remotely switch to an alternative password if they fear that the thief has also got hold of the access details.

If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.

Thousands of laptops are stolen every yearfromhomes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.

?Other security software allows users to erase data remotely or lock down thecomputer. The expression \A、to give the thief an alert mind

B、to express the owners\C、to remind the thief of this conscience D、to make the thief give uphismind

Differentfromother security software, Retriever can. A、recordthe stealing process B、help recognize the lost laptop C、lock down thecomputerremotely D、send a spoken message

One of theprogramis that it allows the owner toat a distance. A、change some access details for switching on the laptop B、turn on the laptop by using the original password C、operate the laptop by means of and alternative password D、erase the information kept in the stolen laptop

Which of the following canbestsummarize the main idea of the passage?

2 / 10

最新教育资料精选

A、With no Retriever, thousands of laptops are stolen every year. B、A new soft ware provides a means to reduce laptop theft. C、Retriever has helped to find thieves and lostcomputers. D、A newprogramoffers a communication platform with the thief.

【答案】: 【解析】:

第3题【阅读理解】

阅读下列短文,从每题所给的四个选项(A、B、C和D)中,选出最佳选项。

In many businesses, computers have largely replaced paperwork, because they are fast, and do not make mistakes. And they are honest. Many banks say that their business is “untouched by human hands” and

therefore safe. But they have no thought that the growing number of computer crimes (犯罪) show they can be used to steal.

Computer criminals (罪犯) don\there is often no proof. A computer cannot remember who used it. It simply does what it is told. The head teller(出纳主管) at a New York City bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this because he moved the money from one account (账户) to another. Each time a customer whose money he had stolen questioned the balance in his account, the teller said it was a computer mistake, then replaced the missing money from someone else\last.

Some workers use the computer\company fired its computer record assistant for reasons that were connected with her personal life rather than

3 / 10

最新教育资料精选

her job. She was given thirty days notice. In those thirty days, she stole all the company\records.

Most computer criminals have been common workers. Now police wonder if this is “the tip of iceberg”. As one official says, “I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing—the ones who really know a computer works.”

This passage is mainly about ________. A、computer crimes

B、stealing through computers C、computer mistakes

D、punishment through computers

Business in many banks is declared to be safe because ________. A、paperwork is no longer needed B、computers are honest

C、people are not allowed to work there D、it is done through computers

The head teller covered up his crimes ________. A、because no one had questioned him B、because he had stolen money carefully C、by moving money through computers D、by lying to the police

The assistant stole all the computerized records ________. A、by chance

B、after she was dismissed

4 / 10

精选2019-2020年高中英语必修1、2Unit 3 Computers人教版课后练习第五十八篇.doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/c8ga2t47avu6gjog0oh073pit886azp004sx_1.html(转载请注明文章来源)
热门推荐
Copyright © 2012-2023 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top