She promised to take _____ my job immediately. That really took a big load _____ my shoulders.
A. away, down
B. up, from
C. over, off
D. on, away
查看答案
Don't take me _____ a fool. I'm not that easily taken _____.
A. for, in
B. as, aback
C. as if, into
D. like, in
I will take _____ what I said. I really believe that when the reforms begin to take effect, our education will take _____.
A. out, up
B. back, off
C. away, forth
D. back, of
Everybody says that he takes _____ his grandfather, with his big fleshy nose that takes _____ too much space on his face.
A. to, up
B. of, off
C. after, up
D. from, away
Trojan HorsesThis article will be played three times. Listen carefully, and fill in the numbered spaces with the appropriate words you have heard.The name “Trojan horse”comes from a legend told in the Iliad about the siege of the city of Troy by the Greeks.Legend has it that the Greeks, unable to penetrate the city’s1 , got the idea to give up the siege and instead gave the city a giant wooden horseas a gift 2 . The Trojans (the people of the city of Troy) accepted this seemingly 3Gift and brought it within the city walls. However, the horse was 4 with soldiers, who came out atnightfall, while the town 5 , to open the city gates so that the 6 of the army could enter.Thus, in the world ofcomputing, a Trojan horse is any program that 7 the user to run it, but concealsa harmful or malicious payload, and usually opens up 8 to the computer running it by opening a 9. For this reason, it is sometimes called a Trojan by analogy tothe citizens of Troy. The payload may take effect 10 and can lead to many undesirable effects, such as deleting all the user’s files, or more commonly it may11further harmful software into the user’s system to serve the creator’s longer-term 12. Trojan horse known as droppers are used to star off a worm 13 , by injecting the worm into users’localnetworks.Since Trojan horses have a 14 of forms, there is no single method to delete them The simplest responses involve clearing the 15 Internet file and deleting it16 . Normally, antivirus software is able to detect and remove the Trojan17 . If the antiviruscannot find it, booting the computer from 18 media, such as a live CD, may allow an antivirus program to find a Trojan and delete it. Updated anti-spyware programs are also efficient against this 19 .Most Trojans also20 in registries, and processes.[音频]