问题 单项选择题

有人把一块关玉献给子罕,子罕不交。似玉者说:我把玉给工匠看了,他们认为是宝物,所以才献给你。子罕回答:“你把玉当作宝.我把不贪当作宝。你把玉给我,那么你失去了玉,我失去了不贪的德,大家都失去了自己的宝物。不如我们各自保有自己的宝物。”子罕拒玉的历史典故包含的哲学道理有()。

①事物的价值是变化的因为其属性和功能具有不确定性

②事物是否具有价值,取决于人们的价值判断

③人们的立场和需要不同,其价值选择就不同

④价值观对人的行为起着重要的导向作用

A.①②

B.①③

C.②④

D.③④

答案

参考答案:D

解析:本题考查有关价值观的知识。①项错误,事物的属性与功能是客观的,是不以人的意识为转移的;②项排除,事物是否具有价值,取决于其自身的属性而并非人们的价值判断;从材料可知,子罕拒玉体现了人的价值判断与价值选择及价值观的导向作用,故③④项正确。因此本题的正确答案是D。【考点定位】必修4生活与哲学中价值观的导向作用、价值判断与价值选择等考点。

单项选择题
单项选择题

Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including p authentication and non-repudiation of transactions.
eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.
A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee (104) of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.
The most secure use of authentication involves enclosing at least one certificate with every signed message. The message (105) verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.

A.interpretation

B.detection

C.encryption

D.translation