题目内容

阅读下面的短文,文中有15处空白,每处空白给出4个选项,请根据短文的内容从4个选项中选择1个最佳答案。 A satisfactory psychological theory must allow us to predict behavior. For instance, a satisfactory theory of hunger will allow us to predict when people will eat and not eat. A broadly satisfying, (51) theory should have a wide range of applicability. A broad theory of hunger might apply (52) human beings and lower animals, to normal weight and overweight people, and to people who have (53) of food for differing lengths of time. If our (54) cannot be adequately explained by or predicted from a given theory, we should consider revising or replacing that theory. In psychology many theories have been found to be (55) of explaining or predicting new observations. As a result they have been revised (56) .For example, the theory that hunger results from stomach contractions may be (57) correct for normal weight individuals, but it is inadequate as an (58) for feelings of hunger among the overweight. (59) theories also focus on biological variables, such as fat cells and brain (60) , and psychological variables such as the presence of other people who are eating and the time of day. The (61) of controlling behavior in psychology is highly (62) . Some people erroneously think that psychologists seek ways to make people do their bidding—like puppets dangling on strings. This is not so. Instead, psychologists help (63) change their behavior for their own benefit. Psychologists are (64) to belief in the dignity of human beings, and human dignity demands that people be free to make their own decisions and choose their own behavior. Psychologists are learning more all the time about the (65) influences on human behavior, but they apply this knowledge only upon request and in ways they believe will be helpful to an individual or an institution.

A. mistaken
B. misunderstood
C. misstated
D. misplaced

查看答案
更多问题

在面向对象程序设计语言中, (24) 是利用可重用成分构造软件系统的最有效的特性,它不仅支持系统的可重用性,而且还有利于提高系统的可扩充性; (25) 可以及实现发送一个通用的消息而调用不同的方法; (26) 是实现信息隐蔽的一种技术,其目的是使类的 (27) 相互分离。 26()

A. 引用
B. 继承
C. 封装
D. 多态

注册会计师A正在拟定对XYZ公司存货的监盘计划,由助理人员实施监盘工作,下面有关监盘计划和监盘工作有无不妥当之处若有,请予以更正(1) 注册会计师A在制定监盘计划时,应与 XYZ公司沟通,确定检查的重点;(2) 对外单位存放于XYZ公司的存货,注册会计师A未要求纳入盘点的范围,助理人员也未实施其他审计程序;(3) 对存放在露天的废钢材,助理人员未要求称量,而是到废旧物资聘请一位资深的收购员代为估量和估价;(4) XYZ公司的一批重要存货,已经被银行质押,助理人员通过电话询问了其存在性;(5) 在检查存货盘点结果时,助理人员从存货实物中选取项目追查至存货盘点记录,目的是测试部分漏盘存货。 (2)处有无不妥当之处若有,请予以更正。

就目前计算设备的计算能力而言,数据加密标准DES不能抵抗对密钥的穷举搜索攻击,其原因是()。

A. DES的算法是公开的
B. DES的密钥较短
C. DES除了其中S盒是非线性变换外,其余变换均为线性变换
DES的算法简单

用来辅助软件开发、运行、维护、管理、支持等过程中的活动的软件称为软件开发工具,通常也称为 (63) 工具。使用软件开发工具有助于提高软件的开发、维护和管理的效率。集成型软件开发环境通常由工具集和环境集成机制组成。这种环境应具有 (64) 。环境集成机制有数据集成机制、控制集成机制和界面集成机制。数据集成机制为环境中的工具提供统一的 (65) ;控制集成机制为 (66) 提供支持。界面集成机制使得环境中的所有工具具有 (67) 。 65()

A. 数据类型
B. 数据模式
C. 数据接口规范
D. 数据仓库

答案查题题库