语言类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
全国英语等级考试(PETS)
大学英语考试
全国英语等级考试(PETS)
英语证书考试
英语翻译资格考试
全国职称英语等级考试
青少年及成人英语考试
小语种考试
汉语考试
PETS三级
PETS一级
PETS二级
PETS三级
PETS四级
PETS五级
单选题{{I}} You will hear 4 short dialogues. For each dialogue, there is one question and four possible answers. Choose the correct answer—[A], [B], [C], or[D]. You will hear each dialogue ONLY ONCE. {{/I}}
进入题库练习
单选题{{I}} Questions 14 ~ 17 are based on an interview between a sportsman and a reporter.{{/I}}
进入题库练习
单选题 {{I}}Questions 15 to 18 are based on the following dialogue happened in a bookstore.{{/I}}
进入题库练习
单选题
进入题库练习
单选题You will hear 10 short dialogues. Fur each dialogue, there is one question and four possible answers. Choose the correct answer—A, B, C or D, and mark it in your test booklet. Yon will have 15 seconds to answer the question and you will hear each dialogue ONLY ONCE.
进入题库练习
单选题
进入题库练习
单选题{{I}}Questions 18~21 are based on the following dialogue.{{/I}}
进入题库练习
单选题
进入题库练习
单选题[此试题无题干]
进入题库练习
单选题Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. "123456" or "12345" are also common choices. That predictability lets security researchers (and hackers) create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on. However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners. Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords; those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked. But it is the broader analysis of the sample that is of most interest to security researchers. Despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will compromise around 1% of accounts." And that is a worthwhile outcome for a hacker. One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various. So it"s time for users to consider the alternatives to traditional passwords.
进入题库练习
单选题
进入题库练习
单选题
进入题库练习
单选题Questions 22--35 are based on the following passage.
进入题库练习
单选题{{I}} Questions 22~25 are based on the fallowing dialogue.{{/I}}
进入题库练习
单选题
进入题库练习
单选题 Questions 14-17 are based on the following passage about loneilness.
进入题库练习
单选题Why is the man tired?
进入题库练习
单选题 Before the nineteenth century, scientists with an interest in the sea were few and far between. Certainly Newton considered some theoretical' aspects of it in his writings, but he was {{U}}(26) {{/U}} to go to sea to {{U}}(27) {{/U}} his work. For most people the sea was {{U}}(28) {{/U}}, and with the {{U}}(29) {{/U}} of early international travelers or others who earned a living from the sea, there was little reason to ask many questions about it, {{U}}(30) {{/U}} alone to ask what lay beneath the surface. The flint time that the question "What is at the bottom of the oceans?" had to be answered with any commercial {{U}}(31) {{/U}} was when the {{U}}(32) {{/U}} of a telegraph cable from Europe to America was proposed. The engineers had to know the depth profile of the {{U}}(33) {{/U}} to estimate the length of cable that had to be {{U}}(34) {{/U}}. It was {{U}}(35) {{/U}} Maury of the US Navy {{U}}(36) {{/U}} the Atlantic Telegraph Company turned, in 1853, {{U}}(37) {{/U}} information on this matter. The cable was laid, but not until 1866 {{U}}(38) {{/U}} the connection made {{U}}(39) {{/U}} and reliable. At the early {{U}}(40) {{/U}}, the cable failed and when it was taken out for repairs {{U}}(41) {{/U}} was found to be covered in living {{U}}(42) {{/U}}, a fact which {{U}}(43) {{/U}} contemporary scientific opinion {{U}}(44) {{/U}} there was no life in the deeper parts of the sea. Within a few years oceanography was {{U}}(45) {{/U}} way.
进入题库练习
单选题{{I}} Questions 18 ~ 21 are based on the following monologue.{{/I}}
进入题库练习
单选题
进入题库练习