题目内容

每个公民要正确行使法律权利,须把握( )。

A. 权利行使的目的要合法;
B. 权利行使的限度要合法;
C. 权利行使的方式要合法;
D. 权利行使的程序要合法。

查看答案
更多问题

移动式泵房一般分为()和()两种。

移动式泵房适用于从水源水位变化幅度较大的河流或水库岸边提水的情况。

A. 对
B. 错

四级笔试模拟试卷6Part III Reading ComprehensionSection ADirections: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank before the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. You may not use any of the words in the bank more than once.Everyone who loves chocolate knows that to get a chocolate out of a box demands a considerable amount of(1): The box has to be taken out of its paper bag; the plastic wrapper has to be torn off, the lid opened and the packing paper inside removed; the chocolate itself then has to be unwrapped from its own piece of paper. Similarly a pot of face cream comes(2)by layers of paper, wedged (挤进) inside a cardboard box, and the whole thing wrapped tightly in plastic. It is not only luxuries which are wrapped in this way.With so many goods now produced centrally and sold in supermarkets it is becoming increasingly difficult to buy anything from nails to potatoes that is not already done up in plastic or paper. The wrapper itself is of no (3)to the shopper, who usually throws it away immediately. Useless wrapping (4)for much of the 31 pounds in weight of rubbish put out by the average London house hold each week. So why is it done? Some of it, like the wrapping on meat, is necessary, but most of the rest is simply(5)selling. This is stupid.Packaging is using up scarce energy and raw materials and (6)all the time. One big firm reports that its glass, aluminum and paper have all gone up by 30 percent in the last couple of months, while plastic has increased by 50 percent and all these prices are still rising. This seems as yet to have had surprisingly little effect on the packaging practice of manufacturers. Little research is being carried out on the costs in energy and materials of other possible types of packaging. Just how practical is it, for instance, for local (7)to save waste paper and remanufacture it as egg boxes? Would it be cheaper to plant another forest to produce new paper? One reason for the unorganized behavior of everyone (8)is probably the varied nature of the packaging industry. So many people, with so many(9)interests of their own, are affected that it is extremely hard to reach any agreement on what should be done. What is worse, packagers may not realize that(10)forests and preventing waste is also of their concern.A) cooperating B) ruining C) precise D) unpacking E) regulation F) different G) wandered H) accounts I) interest J) authorities K) preserving L) surrounded M) recognized N) competitive O) concerned

Section BDirections: In this section, you are going to read a passage with ten statements attached to it. Each statement contains information given in one of the paragraphs. Identify the paragraph from which the information is derived. You may choose a paragraph more than once. Each paragraph is marked with a letter. Answer the questions by marking the corresponding letter.Computer VirusesA) Any computer connected to the Internet faces a daunting range of electronic threats. Perhaps the biggest single threat to any computer is the humble software bug. Seemingly harmless programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to spread.B) Many software bugs will simply cause a computer to crash. But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data.C) When a software weakness is revealed, it is often a race against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage.Viruses and wormsD) A computer virus is a program that spreads between computers by hiding itself within a—seemingly innocent—document or application. A worm, on the other hand, is a program that replicates (复制) and travels without "infecting "anything else on a system.E) Many modern specimens of malevolent (恶意的) code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. The terms are now often used interchangeably.F) The first worms appeared in the 1970s and spread slowly between computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy disks.Trojans and zombiesG) But viruses and worms no longer just provide a way for ill-willed hackers to gain bad reputation. Today's viral code can contaminate computers at lightning speed, spreading via email, peer-to-peer file-sharing networks and even instant messaging programs. The most successful ones cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up.H) A string of recent specimens have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines. These programs are known as Trojan horses.I) There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers—often referred to as "botnets". These groups of remote-controlled "zombies" have been used to extort money from websites, by threatening to crash them with a denial-of-service (DOS) attack. This involves overloading a server with bogus page requests, so that real messages cannot get through.Spam, Spam, SpamJ) Spammers have also begun using botnets to forward unwanted bulk email advertising, or spam, through scores of zombie PCs. This makes it far more difficult for spam hunters to block the messages at source and catch the criminals.K) Once considered a fairly minor problem, spam is rapidly spiraling out of control, and much more than half of all email messages are now thought to consist of unwanted advertising messages.L) To combat computer scientists' best efforts to stem the tide of junk email, the spammers have had to become more cunning and sophisticated. More recently, spim (spam by instant messenger) and spit (spam by internet telephony) have joined the fray.PhishingM) Spam's more sinister cousin is the phishing email. This is a con trick that arrives as an email and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.N) The simplest phishing tricks try to cheat a target into sending money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams pose as customer service emails and send users to false banking or commercial websites where they are invited to "re-enter" their account information.O) Some genuine sites have even proven vulnerable to software glitches that can be exploited to capture information from regular users. Phishing is especially threatening because it can be used to steal a person's digital identity.SpywareP) Along with spam and phishing, spyware represents the third of an unhappy trinity of internet pests. These threatening and secret programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts, change system settings and gather information on a user's online behavior for marketing purposes.HackersQ) The term "computer hacker" was first coined in the 1960s and originally meant someone capable of developing an ingenious solution to a programming problem. But the phrase has since fallen into disrepute, entering the popular vocabulary as a term for a programmer with criminal intent.R) The earliest "criminal" hackers were in fact relatively harmless, interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed innocuous pranks, for example employing low-tech tricks to get free calls through the US phone networks.S) There are many tools in the modern hacking kit, including network scanners, packet sniffers, root kits and decompilers. But "social engineering"—for example, putting a particularly enticing message in an email header to encourage people to open it—and even search engines can also be useful weapons for the hacker.Computer crimeT) As the number of computers networks has grown, so have the possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals.U) Criminal gangs have also started to get in on the action, attracted by the huge quantities of money now spent online everyday. There is evidence that unscrupulous experts can also earn serious money from crime business group by breaking into computer systems, writing viruses and creating phishing scams.V) And it is not just ordinary desktop computers that are under threat. Governments, banks and critical infrastructure can also be brought to a standstill by an expert armed only with a laptop computer and a net connection.Mobile menaceW) The biggest new target for computer hackers is the mobile device. Virus writers are already experimenting with code designed for smart phones and experts predict more may be on the way, while hackers are also looking at ways to crack handheld devices.X) While the Internet has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked with preventing them has only just begun.Vulnerable groupsY) Phishing—fraudulently (欺诈性地) obtaining personal information online—has already affected politics. In 2004, a fake website purporting to be for Democratic presidential candidate John Kerry stole campaign contributions, as well as users' debit-card numbers.Z) Campaigns are vulnerable to phishing because domain names tend not to have a predictable form—compare barackobama.com with joinRudy2008.com—making it difficult to pick the official site. Such attacks could deter people from donating online, a move that would disproportionately affect Democrats and young people, who are more likely than other groups to donate via the web. The low probability of getting caught online, combined with the fact that anti-spam laws and "no-call" lists exempt political messages, makes the threat real. "The fact is that all of the technology for all of these things to happen is already in place," Soghoian says. "I'm not sure this will happen in 2008, but it will happen."11. The seemingly harmless software bug is the biggest single threat to any computer.12. When a software weakness is revealed, the user can always apply the correct software patch to avoid the further damage.13. The first computer virus infected computers via floppy disks.14. Botnets refer to networks of compromised computers or groups of remote-controlled "zombies" that have been used to extort money from websites.15. The simplest phishing tricks are trying to cheat a target into sending money as part of a get-rich-quick scheme.16. Spyware can be used to gather information on a user's online behavior for marketing purposes.17. Some early hackers were harmless, and they may employ low-tech tricks to get free calls through the US phone networks.17. Trojan horses recently have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines.19. The computer hackers' biggest new target is the mobile device.20. The appearance of serious computer criminals is because money increasingly becomes a digital commodity.

答案查题题库