● The computer you are using is protected usually by (75) .
(75)
A. password
B. key
C. mouse
D. USB
第1题:
● A (75) system placed between the company network and the outside world may limit outside access to the internal network.
(75)
A. firewall
B. modem
C. gateway
D. key
第2题:
● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.
(75)A. storage B. device C. network D. processor
第3题:
A(75)system placed between the company network and the outside world may limit outside access to the internal network.
A.firewall
B.modem
C.gateway
D.key
第4题:
Computer(75)is a complex consisting of two or moreconnected computing units, it is used for the purpose of data communication and resource sharing.
A.storage
B.device
C.network
D.processor
第5题:
●Computers will become more advanced and they will also become easier to use.
Improved speed recognition will make the operation of a computer easier. Virtual reality(虚拟现实), the technology of (71) with a computer using all of the human senses, will also contribute to better human and computer (72). Other, exotic (奇异的) models of computation are being developed, including biological computing that uses living organisms, molecular computing that uses molecules with particular (73), and computing that uses DNA, the basic unit of heredity(遗传), to store data and carry out operations. These are examples of possible future computational platforms that, so far, are limited in abilities or are strictly (74) . Scientists investigate them because of the physical limitations of miniaturizing circuits embedded in silicon. There are also (75) related to heat generated by even the tiniest of transistors.
(71) A.interact
B.interacting
C.communicate
D.using
( 72) A .interfaces
B.behavior
C.similarities
D.comparison
(73) A.software
B.properties
C.programs
D.hardware
( 74) A.empirical
B.real
C. practical
D. theoretical
( 75) A. developments
B.advantages
C. limitations
D. improvements
第6题:
Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.
A.symbol
B.sign
C.characters
D.characteristic