题目内容

Standard English is the variety of English which is usually used in print and which is normally taught in schools and to non-native speakers learning the language. It is also the variety which is normally (21) by educated people and used in news broadcasts and other (22) situations. The difference between standard and nonstandard, it should be noted, has (23) in principle to do with differences between formal and colloquial (24) ; standard English has colloquial as well as formal variants.(25) , the standard variety of English is based on the London (26) of English that developed after the Norman Conquest resulted in the removal of the Court from Winchester to London. This dialect became the one (27) by the educated, and it was developed and promoted (28) a model, or norm, for wider and wider segments of society. It was also the (29) that was carried overseas, but not one unaffected by such export. Today, (30) English is arranged to the extent that the grammar and vocabulary of English are (31) the same everywhere in the world where English is used; (32) among local standards is realIy quite minor, (33) the Singapore, South Africa, and Irish varieties are really very (34) different from one another so far as grammar and vocabulary are (35) . Indeed, Standard English is so powerful that it exerts a tremendous (36) on all local varieties, to the extent that many of long-established dialects of England have (37) much of their vigor and there is considerable pressure on them to be (38) . This latter situation is not unique (39) English: it is also true in other countries where processes of standardization are (40) . But it sometimes creates problems for speakers who try to strike some kind of compromise between local norms and national, even supranational (跨国的) ones. 37().

A. lost
B. gained
C. missed
D. got

查看答案
更多问题

700 years ago, in about 1260, the first Europeans (11) to China. They were two brothers, businessmen from Venice in Italy. When they reached China they were welcomed by (12) , and they stayed there for some time before returning home. (13) later they made a second journey to China. One of them took his son along, a young man called Marco Polo. The Polo family spent many years in China. Marco’s father and uncle became rich (14) Marco himself worked for the emperor, becoming one of his advisers, and traveling to (15) other countries in South-East Asia on official business.

某居民区共有居民480户,一年中共发生入室盗窃40余起,县公安局决定向每户居民征收治安费100元,由居委会代收。因绝大多数居民不服公安局的决定,居委会便向市公安局申请复议,经复议,市公安局将县公安局的决定改为治安费按每月每人1元的标准收取。之后仍有350户居民不服复议决定,准备向法院提起行政诉讼,其他居民认为掏点钱买平安也值得,居委会考虑到和公安局的关系,不再出面。 问: 可向何地法院提起诉讼

Sigmund Freud is a key figure in the history of psychology. His contributions to personality theory still dominate contemporary theory about the human personality. Once Freud told a story about an incident in his private practice. As a certain patient left the office after the appointment with Freud, he said, "I’ll pay you later, Dr. Freud. Oh, that is, I’ll pay you later. "Freud said that the seemingly accidental ship of the tongue revealed an unconscious intention. The man did not want to pay Freud for his service and was only "playing" with him. The patient never paid his bill.The story reveals some important things about both Freud and his theories. Although Freud was in private practice, his primary interest was not money. He was interested in theory and would have preferred an academic post. He had difficulties because of the fact that he was a Jew, and private practice was a second-best alternative. The story also illustrates the fact that Freud was a determinist. That is, he believed everything is caused. Even seemingly careless errors such as slips of the tongue have a meaning which suggests that the motive exists outside of the center of consciousness. This is a central concept of Freudian theory-unconscious motives. And people do not always know why they do and what they do. What did Freud think about one of his patients’ remarks "I’ll pay you later, Dr. Freud. "()

A. He was joking with Freud.
B. He played in Freud’s office.
C. He unconsciously revealed his intention of refusing to pay.
D. He only made his empty promise to Freud.

The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.The objectives of early hackers are a far cry from the goals of today’s hackers. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities--phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services--Use intrusion detection systems, vulnerability scans, anti-virus protection. Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE().

A. They are all good examples of today’s computer users.
B. They are driven by greed, power, revenge, or some other malicious intent.
C. Their goal is to push programs beyond what they are designed to do.
D. They are all dead.

答案查题题库