It is 4 o’clock in the early morning. Ev

题型:阅读理解

问题:

It is 4 o’clock in the early morning. Everything but the computing room on the campus of the university appears as quiet and misty as the mysterious hell. In the computing room, 30 students with sleepy eyes, sit still at their desk, beating the dirty and worn keys. Staring at the colorful screen, they tap continuously for hours. For the other parts in the world, it might be in the middle of the night, nevertheless here time represents nothing. It is an entirely enclosed field. These young computer “hackers” are tracing a sort of stimulus (刺激), a drive so exciting and absorbing that it ignores nearly anything else in their lives and becomes the focus of their being. They are addicted (上瘾的) computer programmers. Some of these students have been glued to the console (电子设备的操纵台) for no less than twenty hours even with no break for meals or rest. Some have been sleeping on sofas and chairs in the computing room, trying to struggle for a few moments’ rest but hating to get too far away from their addicted machines.

It is not necessary for most of these students to be at the computing room in the middle of the night. What they are working belong to no assignments. They remain there because they desire to be — they can not resist the attraction of the computers.

Furthermore, they are in groups instead of being alone. There are hackers at computing rooms all over the country. In the unimaginable way, they focus on nothing but computer. They escape from schooling and live beyond friendship; they might have difficulty being employed, choosing to travel from one computing room to another. They may even give up personal health.

“There is one hacker in my memory. We actually had to lift him away from his chair to feed him and arrange him to rest and sleep. We truly worried about his health,” says a computing science professor at California University.

Professors of computer science are nowadays paying more attention to this hacker phenomenon and are on the watch for future hackers and more and more severe computer addicts. They believe firmly that hackers are not simply resulted from the close relationship with a machine. It is the result of social relationship with the attractive thinking machines, which are becoming nearly universal.

小题1:We can learn from the passage that those at the computing room in the middle of the night are     .

A.students working on a program

B.students using computers to amuse themselves

C.hard-working computer science majors

D.students deeply fascinated by the computer小题2:Which of the following is NOT true of those young computer “hackers”?

A.Most of them are top students majoring in computer programming.

B.For them, computer programming is the only purpose for their life.

C.They can stay with the computer at the computing room for nearly two days.

D.Their love for the computer is so deep that they want to be near their machines even when they sleep.小题3:It can be reasonably inferred from the passage that ______.

A.the hacker phenomenon exists only at university computing rooms

B.it is not very easy for the “hackers” to find friends or jobs

C.university computing rooms are expecting outstanding programmers out of the “hackers”

D.the hacker phenomenon is partly due to the lack of the computing rooms小题4:According to professors of computer science, the hacker phenomenon can be described as     .

A.positive

B.disgusting

C.worrying

D.admiring小题5:Which of the following may be the most appropriate title for the passage?

A.The Charm of Computer Science

B.A New Type of Electronic Toys

C.Future Computer Programmers

D.Computer Addicts

考点:社会现象类阅读
题型:阅读理解

《建设工程安全生产管理条例》规定,施工起重机械和整体提升脚手架、模板等自升式架设设施安装完毕后,( )应当检验,出具自检合格证明。

A.具有专业自治的检验机构

B.专业技术人员

C.施工单位

D.安装单位

题型:阅读理解

试题二(共15分)阅读以下说明,回答问题1至问题4,将解答填入答题纸对应的解答栏内。【说明】Linux系统有其独特的文件系统ext2,文件系统包括文件的组织结构、处理文件的数据结构及操作文件的方法。可以通过命令获取系统及磁盘分区状态信息,并能对其进行管理。

【问题3】(4分)在Linux中,分区为主分区、扩展分区和逻辑分区,使用fdisk –l命令获得分区信息如下所示:

其中,属于扩展分区的是 (5) 。使用df -T命令获得信息部分如下所示:

其中,不属于Linux系统分区的是 (6)

题型:阅读理解

核心流动资产应当由长期融资来实现。 ( )

题型:阅读理解

回弹仪具有哪些情况时应送检定单位检定?

题型:阅读理解

增量预算方法的假定条件不包括()。

A.现有业务活动是企业必需的

B.原有的各项开支都是合理的

C.增加费用预算是值得的

D.所有的预算支出以零为出发点

更多题库