问题 单项选择题

SDH信号最基本的模块信号是()。

A.STM-0

B.STM-1

C.STM-3

D.STM-4

答案

参考答案:B

解析:多道程序设计是在计算机内存中同时存放几道相互独立的程序,使它们在管理程序控制之下,相互穿插运行。DOS系统没有多道程序设计的特点。

问答题

某高速公路工程项目在设计文件完成后,项目业主委托了一家监理公司协助业主进行施工招标和实施施工阶段监理。
监理合同签订后,总监理工程师分析了项目规模和特点,拟按照组织结构设计、确定管理层次、确定监理目标和制订工作内容、确定监理目标和制订监理工作流程等步骤,来建立本项目的监理组织结构。
施工招标前,监理单位编制了招标文件,其主要内容包括:
①工程综合说明。
②设计图纸和技术资料。
③工程量清单。
④施工方案。
⑤主要材料及设备供应方式。
⑥保证工程质量、进度、安全的主要技术组织措施。
⑦特殊工程的施工要求。
⑧施工项目管理机构。
⑨合同条件等。
为了使监理工作规范化进行,总监理工程师拟以工程项目建设条件、监理合同、施工合同、施工组织设计和各专业监理实施细则为依据,编制施工阶段监理规划。
监理规划中各规定监理人员的主要职责如下:
(1)总监理工程师职责:
①审核并确认分包单位资质。
②审核签署对外报告。
③负责工程计量、签署原始凭证和支付证书。
④及时检查、了解和发现总承包单位的组织、技术、经济和合同方面的问题。
⑤签发开工令。
(2)监理工程师职责:
①主持建立监理信息系统,全面负责信息沟通工作。
②对所负责控制的目标进行规划,建立实施控制的分系统。
③检查确认工序质量,进行检验。
④签发停工令、复工令。
⑤实施跟踪检查,及时发现问题及时报告。
(3)监理员职责:
①负责检查及检测材料、设备、成品和半成品的质量。
②检查施工单位人力、材料、设备、施工机械投入和运行情况,并做好记录。
③记好监理日志。
问题

各监理人员的主要职责划分有哪几条不妥如何调整

阅读理解

阅读理解

     Remember putting a shiny coin into your piggy bank when you were a child? Those simple little money holders kept your coins and bills safe until you had saved enough to buy the perfect toy. But as an adult. ,

you need more sophisticated measures to protect your savings.

     Banks use personal identification numbers. , safety deposit boxes. , insurance and other measures to

help keep money safe. But now that many people bank online. , even more precautions must be taken.

In 2004. , more than 2 million online U. S. bank accounts were robbed. By using lookalike bank websites. , fake bank emails. , or simple by hacking into computer systems. , thieves stole online passwords and

gained access to accounts.

     Most consumers now take steps to protect themselves against thieves. They use high security setting

on Internet browsers. , and they avoid using public computers and wireless networks for bank transactions. , and if there is anything unusual. , they contact their banks immediately.

     Despite taking precautions. , even the most careful consumers aren't always safe. Identity theft. , one

of the fastestgrowing financial crimes. , has affected millions of people around the world. By stealing

personal data. , thieves can pretend to be you-and spend your money.

     This frightening crime affected consumer Chevonne KingLewins in 2002. She learned that someone

had opened more than 25 credit card accounts in her name and had used them to charge more than

US$37,000. "It's_really_scary_knowing_someone_else_has_been_living_my_life. , " she said.

     Financial scams(欺诈) are also a threat. , with senior citizens often being targeted. Neal Dukes. , a

72yearold from Michigan. , lost US$250,000 a few years ago when he followed the advice of financial

adviser. Then 'adviser'-actually a man who regularly cheats others-persuaded Dukes and 17 others to

make a bogus(假的) investment. , which cost them big.

     What can be done? To fight identity theft. , privacy rights advocates(倡议者) educate consumers on

how to protect their privacy. To protect against scams. , seniors are joining together to educate and warn

each other of such crime.

     Make sure you're safeguarding your money. You earned it-you deserve to keep it!

1. The underlined word "sophisticated" in Paragraph 1 can be replaced by

"________".

A. advanced      

B. fashionable      

C. skilled      

D. difficult

2. From the underlined sentence in Paragraph 5 we learn that ________.

A. it is getting harder and harder to keep money safe nowadays

B. she warned seniors to take precautions to protect their money

C. it is necessary to educate and warn each other of financial crimes

D. the fact that someone was stealing her money frightened her

3. According to the passage. , the best way to protect your money is to ________.

A. bank online                

B. protect your privacy

C. use piggy banks              

D. contact your bank constantly

4. According to the passage. , what are seniors doing to protect against scams?

A. Taking their money with them every day.

B. Using credit card accounts.

C. Keeping away from financial advisers.

D. Telling each other about crimes and staying alert.

5. Which of the following events is NOT mentioned in the passage?

A. Robbery of bank accounts.

B. Identity theft.

C. Use of fake money.

D. Financial scams.