首页
登录
职称英语
[A]threatened[I]comprehensive [B]extent[J]neglected [C]diagnose[K]st
[A]threatened[I]comprehensive [B]extent[J]neglected [C]diagnose[K]st
游客
2024-09-17
38
管理
问题
[A]threatened[I]comprehensive
[B]extent[J]neglected
[C]diagnose[K]staff
[D]replaced[L]vulnerable
[E]incalculable[M]access
[F]Initially[N]Practically
[G]extreme[O]potential
[H]component
Computer experts have been gripped by fear of a dangerous illness. It is highly infectious, difficult to【C1】______and in many cases impossible to cure.
It is not computer experts or programming【C2】______who are likely to be affected, but rather the electronic data banks themselves. Computer programmes are【C3】______by a computer "virus" that can pull down entire computer networks once it has been secretly brought into the system.【C4】______, the viruses were quite harmless. Amateur computer enthusiasts secretly brought them into big electronic systems, where they showed up as little message or games. Such spectacular cases of computer espionage have shown that the big data banks are efficient, but also【C5】______.
Many experts complain that computer safety has been【C6】______for too long. By threatening to place a computer virus into the heart of the electronic data system, a large company could be put under【C7】______pressure. The damage by computer viruses is already【C8】______. The secret thing about computer viruses is that if they are well programmed they will spread throughout the entire system unnoticed. Bit by bit they infect the programmes that they have【C9】______to and then one day they jump into action all at once.
And there seems to be hardly any countermeasures. The chance of finding a computer virus in an electronic system without【C10】______know-how and technical programme assistance is practically zero. [br] 【C5】
选项
答案
L
解析
所填的词应为形容词,与efficient相对应。空格前提到big data banks are efficient,接着就是but进行转折,因此应填入一个表负面意义的形容词,所以选[L]vulnerable。
转载请注明原文地址:http://tihaiku.com/zcyy/3762521.html
相关试题推荐
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
[A]threatened[I]comprehensive[B]extent[J]neglected[C]diagnose[K]st
A.imposedB.accountC.onD.scaleE.extentF.denselyG.inH.whenI.appli
A.imposedB.accountC.onD.scaleE.extentF.denselyG.inH.whenI.appli
A.imposedB.accountC.onD.scaleE.extentF.denselyG.inH.whenI.appli
A.imposedB.accountC.onD.scaleE.extentF.denselyG.inH.whenI.appli
随机试题
Withoutthefrictionbetweentheirfeetandtheground,peoplewouldinno_____
[audioFiles]audio_eusm_j02_001(20082)[/audioFiles]A、Sam’skneeshouldbebetter
NewresearchfromVanderbiltUniversitysuggeststhatwecanremembermorefa
某施工单位与建设单位签订了路基工程施工承包合同,包括桥涵两座和路基填筑工程,合同
材料:有一个西方流传的民谣是这样说的:丢失一个钉子,坏了一只铁蹄;坏了一只铁蹄,
以下属格列齐特(达美康)的正确作用机制是A:促进葡萄糖合成糖原 B:增强机体对
期货公司董事长、监事会主席、独立董事、经理层人员和取得经理层人员任职资格但未实际
根据企业国有资产法律制度的规定,国有金融企业经批准进行改组改制涉及资产评估的,资
固定资产原值变动不需制作记账凭证传递到总账系统。()
(2018年真题)价值工程应用对象的功能评价值是指()。A.可靠地实现用户
最新回复
(
0
)