问题 阅读理解与欣赏
阅读理解。
铁骨铮铮
  在中华名族的史册上,爱国主义是其光辉灿烂的篇章,志士的名字如繁星浩瀚,壮烈的业绩与日月同光。民族英雄们以“铁骨铮铮”挺起了中 * * 坚贞勇毅、自强不息的脊梁。 
  抗元将领文天祥,于国家危亡之际,竭诚全力,率兵抗元,被俘后坚贞不屈,从容赴死。他留下“人生自古谁无死,留取丹心照汗青”的遗言,成为激励后人、砥砺气节的千古绝句。抗金名将岳飞,以。还我河山,,为铭言,为收复失地,率领岳家军精忠报国,冲锋陷阵,二十年金戈铁马,边关鏖战,英雄们的名字使侵略者闻风丧胆。爱国诗人陆游心系国家的危亡,两鬓苍苍仍壮心不已,临终时仍在嘱咐儿子“王师‘北定中原日,家祭无忘告乃翁”。苏武出使被扣,荒漠牧羊十九载,仍手持节杖,心向汉廷。史可法扬州死节,戚继光痛击倭寇,于谦、张煌言、辛弃疾、严常山……这些古代民族英雄一腔浩然气,耿耿忠烈心,历来被人们景仰和称颂。他们的爱国精神浇铸了后人的钢筋铁骨,鼓舞着近现代英雄与帝国主义、殖民主义、封建主义做拼死的抗争。从林则徐到孙中山,从农民的天国到资产阶级的共和国,从起义改良到翻天覆地的社会变革,多少英豪“生当作人杰,死亦为鬼雄”,前赴后继,用血肉之躯筑起了民族尊严的钢铁长城。     
  斗转星移,沧海桑田,历史的车轮碾过那些多难的岁月,流逝到了今天。今天,我们伟大的中 * * 屹立在世界东方,五星红旗飘扬在五湖四海。和平了,没有战争和硝烟了,我们也不再要抛头颅、洒热血,以生命唤起尊严。但沸腾的时代给我们提出了更严峻的要求,改革开放的中国需要英雄。工厂、矿山、农村,多少高天厚土呼唤我们的翅膀、脚步;科研所、设计院,多少新领域新课题要我们开发填补。灿烂不应只属于古代,英雄不应只属于战火。时代提醒我们,铁骨不能软!我们确信,我们拥有祖先遗传的英雄气质,有不屈不挠、自强自立的民族魂,凭着这个,我们就可以拥有一种精神上的浩气凛然。不能再驻足于低谷,看着别人在峰顶上奔走,而顾影自怜。我们完全有能力爬上去,站在山顶大声说:“中国能够,中 * * 的子孙完全能够攀上时代的峰顶!”  
  事实不正是这样吗?请看看今天吧!时代英雄手中的红旗,已飘扬在地球的南极,飘扬在太空,飘扬在珠穆朗玛峰顶,飘扬在奥运比赛大厅……     
  同学们,请注视国旗下笔直的旗杆吧!它迎风坚挺,岿然不动,那不就是中华英雄铮铮铁骨的象征?让我们继承前人的遗志,挺起钢铁般的脊梁,在进军现代化的路上续写中 * * 灿烂的篇章!
1.在下列加粗字的正确读音下画“√”。
(cè chè)(jì jī)梁(jí jǐ)
容(cōng cóng)(gē gě)(zhì zhǐ)
2.写出下列句子中出现的反义词。
(1)不能再驻足于低谷,看着别人在峰顶上奔走。
(2)和平了,没有战争和硝烟了,我们也不再要抛头颅、洒热血,以生命唤起尊严。
(  )——(  )(  )——(  )(  )——(  )
3.请用“______”画出文中的排比句。
4.(1)他留下“人生自古谁无死,留取丹心照汗青”的遗言。句中的引号表示__________________________的作用。
  (2)“史可法扬州死节,戚继光痛击倭寇,于谦、张煌言、辛弃疾、严常山……”这句中的省略号表示________________________。
5.这篇文章的主要内容和中心思想是什么?
________________________________________________________________
________________________________________________________________
6.你还知道哪些爱国诗人留下的爱国名篇?把它写在下面。
________________________________________________________________
答案

1.cè  jì  jǐ  cóng  gē  zhì
2.(1)驻足一奔走   低谷一峰顶(2)和平一战争
3.史可法扬州死节,戚继光痛击倭寇,于谦、张煌言、辛弃疾、严常山……(答案不唯一)
4.(1)引用诗句(2)省略内容
5.民族英雄们以“铁骨铮铮”挺起了中 * * 坚贞勇毅、自强不息的脊梁。 (意思对即可)
6.谭嗣同的《狱中题壁》:望门投止思张俭,忍死须臾待杜根。我自横刀向天笑,去留肝胆两昆仑。

多项选择题
填空题

Clattering keyboards may seem the white noise of the modern age, but they betray more information than unwary typists realize. Simply by analyzing audio recordings of keyboard clatter, computer scientists can now reconstruct an accurate transcript of what was typed--including passwords. (41) .
Such snooping is possible because each key produces a characteristic dick, shaped by its position on the keyboard, the vigor and hand position of the typist, and the type of keyboard used. But past attempts to decipher keyboard sounds were only modestly successful, requiring a training session in which the computer matched a known transcript to an audio recording of each key being struck. (42) . Furthermore, each new typist or keyboard required a fresh transcript and training session, limiting the method’s appeal to would-be hackers.
Now, in a blow to acoustic security, Doug Tygar and his colleagues at the University of California, Berkeley, have published details of an approach that reaches 96% accuracy, even without a labeled training transcript. (43) . The software tentatively assigns each click a letter based on its frequency, then tests the message created by this assignment using statistical models of the English language. For example, certain letters or words are more likely to occur together-if an unknown keystroke follows a "t", it is much more likely to be an "h" than an "x". Similarly, the words "for example" make likelier bedfellows than "fur example". In a final refinement, the researchers employed a method many students would do well to deploy on term papers., automated spellchecking.
By repeatedly revising unlikely or incorrect letter assignments, Dr. Tygar’s software extracts sense from sonic chaos. That said, the method does have one limitation: in order to apply the language model, at least five minutes of the recorded typing had to be in standard English (though in principle any systematic language or alphabet would work). But once those requirements are met, the program can decode anything from epic prose to randomized, ten-character passwords.
(44) . He says it is quite simple to find the instructions needed to build a parabolic or laser microphone on the web. You could just point one from outside through an office window to make a recording. And as he points out, would-be eavesdroppers might not even need their own recording equipment, as laptop computers increasingly come equipped with built-in microphones that could be hijacked.
(45) . His computers were less successful at parsing recordings made in noisy rooms. Ultimately, though, more sophisticated recording arrays could overcome even background noise, rendering any typed text vulnerable. Dr. Tygar therefore recommends that typed passwords be phased out, to be replaced with biometric checks or multiple types of authorization that combine a password with some form of silent verification (clicking on a pre-chosen picture in a selection of images, for example). Loose lips may still sink ships, but for the moment it seems that an indiscreet keystroke can do just as much damage.
[A] This sort of acoustic analysis might sound like the exclusive province of spies and spooks, but according to Dr. Tygar, such attacks are not as esoteric as you might expect.
[B] The sounds of typing can be decoded, which can be used to decode password, so if you are typing random, secure passwords.
[C] The new approach employs methods developed for speech-recognition software to group together all the similar-sounding keystrokes in a recording, generating an alphabet of clicks.
[D] To protect against these sonic incursions, Dr. Tygar suggests a simple remedy: turn up the radio.
[E] The major advance here is that it no longer requires hours of training the model in order to create a usable mapping of key sounds to letters.
[F] And in contrast to many types of computer espionage, the process is simple, requiring only a cheap microphone and a desktop computer.
[G] Thus schooled, the software could still identify only 80% of the characters in a different transcript of the same typist on the same machine.