问题 选择题

读某气象站(1oN,35oE,海拔1875米)气候资料,据此回答下列各题。

小题1:该气象站所在地的气候类型是(    )

A.热带雨林气候

B.热带草原气候

C.热带季风气候

D.热带沙漠气候小题2:该气象站1月日平均日照时数高于7月,主要是因为该地1月(    )

A.正午太阳高度大

B.白昼时间长

C.太阳辐射强

D.晴朗天气多

答案

小题1:B   

小题2:D

题目分析:

小题1:根据经纬度判断,该地位于东非高原。根据表格中数据判断,该地全年高温,为热带地区,从降水量分配看,降水量有明显的季节变化,所以只能是热带草原气候。B对。热带雨林气候全年降水量大,降水量季节变化小,该地1月、7月的降水量差距大,A错。在非洲没有季风气候分布,C错。该地降水较多,不可能是沙漠气候,D错。

小题2:日照时数与当地的天气状况密切相关。读表格数据,该地1月降水量20.4mm,降水少晴天多,所以日照时数多;7月降水量123.3mm,降水多,阴天多,所以日照时数少;D对。正午太阳高度主要影响日照强度 ,不是日照时数的主要影响因素,A错。该地位于北半球,1月白昼时间比7月白昼时间短,B错。北半球,夏季太阳辐射比冬季强,C错。

阅读理解

B

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.

Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.

In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.

This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

40.Which of the following statements is true according to the passage?

A.It is secure to use your password as long as you hit the Return key.

B.Your personal details is likely to be in danger if you spend more time on the web.

C.Your password will be safe if you have some safeguards.

D.Never allowing your computer to store your passwords will be safe.

41.Which of the following is NOT the reason for the unsafety of a password?

A.It will be stored in RAM.

B.It will be copied onto hard disk.

C.It might not be overwritten.

D.It will disappear as soon as you hit the return key.

42.Tal Garfinkel and his team measured the extent of security of       .

A.simulating the working of a complete computer system

B.tagging sensitive data

C.passing through the system

D.running common software

43  What can be inferred from the passage?

A.The length of the time the information is stored is not limited.

B.The programs can not retain the information.

C.The security problem should be paid more attention to.

D.Some sensitive information has been copied.

判断题