问题 材料分析题

关心国家大事

三峡库区城镇搬迁自1993年全面展开以来,新城建设进度达到了预定目标。因兴建三峡工程,万县市需要移民近80万人,搬迁1座中等城市、5座县城及955个工矿企业,各项实物主要淹没指标占整个库区2/3左右。面对大局,万县市人民毫无怨言,甘愿为三峡工程建设作出必要的牺牲。在移民工作中,部分群众虽然受到利益损失,但他们都能舍小家为大家,愉快搬迁,保证了三峡搬迁工作的顺利进行。10多年来,三峡库区累计搬迁安置移民70多万人,没有发生1起暴力冲突事件。

阅读材料,完成问题:

1.在移民工作中,部分群众的利益虽然受到损失,但他们是怎样处理的?

________________________________________________________________________________

2.三峡人民的做法对你有什么启发?

________________________________________________________________________________

3.在你的生活中,有过个人利益与集体利益发生矛盾的事情吗?请举两个例子加以说明。

________________________________________________________________________________

________________________________________________________________________________

答案

1.在移民工作中,当个人的利益与集体利益发生矛盾时,他们自觉服从集体利益,以集体利益为重,必要时不惜牺牲个人利益。    

2.那些以大局为重、自觉服从集体利益的人值得我们敬佩和尊重,是我们学习的榜样。我充分认识到:集体利益高于个人利益,集体利益至高无上。    

3.(1)在周日,学校有集体活动,我自己有事,仍积极参加厂活动。(2)有一次,尽管我休息得很晚,但坚持完成了作业。

阅读理解

B

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

40.Which of the following statements is true according to the passage?

A.It is secure to use your password as long as you hit the Return key.

B.Your personal details is likely to be in danger if you spend more time on the web.

C.Your password will be safe if you have some safeguards.

D.Never allowing your computer to store your passwords will be safe.

41.Which of the following is NOT the reason for the unsafety of a password?

A.It will be stored in RAM.

B.It will be copied onto hard disk.

C.It might not be overwritten.

D.It will disappear as soon as you hit the return key.

42.Tal Garfinkel and his team measured the extent of security of       .

A.simulating the working of a complete computer system

B.tagging sensitive data

C.passing through the system

D.running common software

43  What can be inferred from the passage?

A.The length of the time the information is stored is not limited.

B.The programs can not retain the information.

C.The security problem should be paid more attention to.

D.Some sensitive information has been copied.

单项选择题 A1/A2型题