版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、第 頁2021四川考研英語考試考前沖刺卷本卷共分為1大題50小題,作答時(shí)間為180分鐘,總分100分,60分及格。一、單項(xiàng)選擇題(共50題,每題2分。每題的備選項(xiàng)中,只有一個(gè)最符合題意) 1.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused
2、substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti
3、-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these address
4、es were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason S
5、oBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- th
6、reading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsofts Windows operating system to allow one computer t
7、o control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix
8、 the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called We
9、lchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused d
10、amage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on Americas east coast. Computer scientists expect that it is only a matter of time before a truly d
11、evastating virus is unleashed.We learn from the passage that Welchi is()Aa wicked worm causing as many damages as Blaster did.Ba program designed by Haley to detect worms like Blaster.Ca program intended to fix the infected machines.Da worm meant to defeat the virus with pings.2.Text 2SoBig. F was t
12、he more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus
13、spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question
14、 cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addre
15、sses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-
16、drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked
17、by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsofts Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesse
18、s in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is
19、 to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming
20、networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New Yo
21、rk Times newsroom, and the one organizing trains operated by CSX, a freight company on Americas east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.The word doctored ( Line 9, Paragraph 1 ) probably means()Acured a disease,Bdiagnosed
22、a virus.Cbecame a doctor.Dchanged to deceive.3.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by
23、 anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to t
24、he sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been
25、doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other vir
26、uses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultane
27、ously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsofts Windows operating system to allow one computer to control another. It did so by causing that soft
28、ware to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itsel
29、f was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has
30、 caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of
31、a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on Americas east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.SoBig. F damaged co
32、mputer programs mainly by()Asending them an overpowering number of messages.Bharvesting the addresses stored in the computers.Cinfecting the computers with an invisible virus.Ddestroying the anti-virus software of the computers.4.Text 2SoBig. F was the more visible of tile two recent waves of infect
33、ion, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by mess
34、ages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus.
35、SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even tho
36、ugh their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an inte
37、rnet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedu
38、re call. In other word, that means it attacked a piece of software used by Microsofts Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaste
39、r had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around
40、 repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the
41、 presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains o
42、perated by CSX, a freight company on Americas east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.What can we infer from the last paragraph()AComputer scientists are quit optimistic about the existing anti-virus programs.BComputer sci
43、entists are looking forward to the coming anti-virus programs.CComputer scientists consider the existing viruses not the really destructive ones.DComputer scientists regard the coming viruses as the really destructive ones.5.Text 2SoBig. F was the more visible of tile two recent waves of infection,
44、because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages
45、from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig
46、. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though t
47、heir machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-
48、security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure ca
49、ll. In other word, that means it attacked a piece of software used by Microsofts Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had
50、 a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repa
51、iring vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the pres
52、ence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operat
53、ed by CSX, a freight company on Americas east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.Compared with SoBig. F, Blaster was a virus that was()Amore destructive.Bmore humorous.Cless vulnerable.Dless noticeable.6.Text 3Of all the t
54、ruths that this generation of Americans hold self-evident, few are more deeply embedded in the national psyche than the maxim It pays to go to college. Since the GI Bill trans-formed higher education in the aftermath of WWII, a college diploma, once a birthright of the leisured few, has become an at
55、traction for the upwardly mobile, as integral to the American dream as the pursuit of happiness itself. The numbers tell the story: in 1950s, 43% of high-school graduates went on to pursue some form of higher education; at tile same time, only 6% of Americans were college graduates. But by 1998, alm
56、ost 2 to out of 3 secondary-school graduates were opting for higher education - and 21% of a much larger U.S. population had college diplomas. As Prof. Herbert London of New York University told a commencement audience last June: the college experience has gone from a rite passage to a right of pass
57、age.However, as the class of 2004 is so painfully discovering, while a college diploma remains a requisite credential for ascending the economic ladder, it no longer guarantees the good life. Rarely since the end of the Great Depression has the job outlook for college graduates appeared so bleak: of
58、 the 1.1 million students who received their bachelor degrees last spring, fewer than 20% had lined up full-time employment by commencement. Indeed, an uncertain job market has precipitated a wave of economic fear and trembling among the young. Many of my classmates are absolutely terrified, says on
59、e of the fortunate few who did manage to land a permanent position. They wonder if theyll ever find a job.Some of this recession-induced anxiety will disappear if a recovery finally begins to generate jobs at what economists consider a normal rate. But the sad fact is that for the foreseeable future
60、, college graduates will in considerable surplus, enabling employers to require a degree even for jobs for which a college education is really unnecessary. According to Kristina Shelley of the Bureau of Labor Statistics - who bases her estimate on a moderate projection of current trends - 30 per- ce
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 高考物理總復(fù)習(xí)專題一直線運(yùn)動(dòng)第3講運(yùn)動(dòng)學(xué)圖像練習(xí)含答案
- 蔬菜采購合同的簽訂證明
- 電子地磅工崗位職責(zé)
- 江蘇省江陰市七年級體育與健康上冊《蹲踞式跳遠(yuǎn)》教案
- 2024-2025學(xué)年高中政治 第4單元 第9課 第1框 建設(shè)社會主義文化強(qiáng)國教案 新人教版必修3
- 2023一年級數(shù)學(xué)上冊 5 6~10的認(rèn)識和加減法第1課時(shí) 6和7的認(rèn)識教案 新人教版
- 2024六年級語文下冊 第五單元 14 文言文二則說課稿 新人教版
- 2024-2025學(xué)年高中生物 第7章 第2節(jié) 現(xiàn)代生物進(jìn)化理論的主要內(nèi)容1教案 新人教版必修2
- 2023二年級語文下冊 第三單元 識字2 傳統(tǒng)節(jié)日說課稿 新人教版
- 高考地理一輪復(fù)習(xí)第十一章交通運(yùn)輸布局與區(qū)域發(fā)展第一節(jié)區(qū)域發(fā)展對交通運(yùn)輸布局的影響課件
- 防水工程施工報(bào)價(jià)表
- 反擊式破碎機(jī)說明書
- 共青團(tuán)中山市12355青少年綜合服務(wù)平臺建設(shè)方案
- 索道年度自檢報(bào)告
- 二年級數(shù)學(xué)小故事(課堂PPT)
- 項(xiàng)目安全管理工作流程圖
- 國家開放大學(xué)《生產(chǎn)與運(yùn)作管理》形考作業(yè)1-4參考答案
- 中國壓力容器標(biāo)準(zhǔn)與美國ASME規(guī)范的比較(DOC 8頁)
- 起重機(jī)軌道修理施工方案(共18頁)
- 交警大隊(duì)協(xié)勤人員管理制度-規(guī)章制度文書
- 內(nèi)部控制評價(jià)的內(nèi)容內(nèi)部控制評價(jià)制度
評論
0/150
提交評論