题目内容

Questions 11 to 18 are based on the conversation you have just heard.

A. Ten.
B. Twenty.
C. Fifteen.
D. Twenty-five.

查看答案
更多问题

There is a general expectation that teachers can spot talented children and do something for them. But studies have 1 that teachers do not always 2 gifted children, even those 3 academic talent. In fact, they 4 to identify from 10 to 50 percent of their gifted students. The first 5 in identifying gifted students is determining the 6 for finding them. If we want to 7 a group of students for an 8 mathematics class, our approach would be different than 9 we are looking for students with high talent 10 a creative-writing program. Specific program needs and requirements, then, 11 the identification process. Subjective evaluation--teacher 12 , parent referral--should be 13 by standardized tests and other 14 measures of ability. Any 15 for identifying gifted children in a school system should 16 both subjective and objective methods of 17 Classroom behavior, for example, can point 18 children’’s ability to organize and use materials and reveal their potential for processing information better than 19 a test situation. Many aspects of creativity and verbal fluency are also best 20 in a classroom or informal setting. There is a general expectation that teachers can spot talented children and do something for them. But studies have 1 that teachers do not always 2 gifted children, even those 3 academic talent. In fact, they 4 to identify from 10 to 50 percent of their gifted students. The first 5 in identifying gifted students is determining the 6 for finding them. If we want to 7 a group of students for an 8 mathematics class, our approach would be different than 9 we are looking for students with high talent 10 a creative-writing program. Specific program needs and requirements, then, 11 the identification process. Subjective evaluation--teacher 12 , parent referral--should be 13 by standardized tests and other 14 measures of ability. Any 15 for identifying gifted children in a school system should 16 both subjective and objective methods of 17 Classroom behavior, for example, can point 18 children’’s ability to organize and use materials and reveal their potential for processing information better than 19 a test situation. Many aspects of creativity and verbal fluency are also best 20 in a classroom or informal setting.

Children experiencing a divorce need extra care because they are afraid of ______.

Compared with IBM, Microsoft is a mere young company. Founded in 1975, it rose swiftly to dominate the world of personal computing with its Windows operating system and Office suite of word-processing and other productivity tools. But the company is now showing some worrying signs of middle-age fatigue. In particular, it is struggling to find a growth strategy that will enthuse disappointed shareholders. Complaint are understandable. Since Steve Ballmer took over from Bill Gates as chief executive in 2000, Microsoft’s share price has decreased and the company has lost its reputation as a tech trend-setter. It has been left behind in hot areas such as search and social networking by younger companies, some of which love to thumb their noses at their older rival. Eric Schmidt, the executive chairman of Google, recently proclaimed that leadership in the tech world had passed from Microsoft and others to a "Gang of Four" fast-growing, consumer-oriented businesses: Google, Apple, Amazon and Facebook. Few would object to that. The question is: what,if anything, can Microsoft do to change it In at least some respects, the company appears to be suffering from similar ailments to those that laid IBM low before Lou Gerstner was hired in 1993 to get it back on its feet. These include arrogance bred of dominance of a particular area-mainframe computers at IBM, personal computers at Microsoft—and internal fiefs that hamper swift change. As IBM’s experience shows, recovery in the tech world is possible. And some observers see encouraging signs of progress at Microsoft. Sarah Rotman Epps of Forrester, a research firm, reckons that Windows 8, a forthcoming version of Microsoft’s operating system, could be a serious competitor to Google’s Android on tablet computers if the company can get it to market next year.Microsoft is also in far better shape financially than IBM was at its lowest point, so it can afford to splash out on acquisitions such as its recent $8.5 billion purchase of Skype, an internet-phone and video-calling service. That bet and an alliance with Nokia in mobile phones show that Microsoft is trying to bulk up in promising areas. Yet sceptics worry that such initiatives are not the product of an comprehensive strategic vision, but are instead temporary moves designed to calm critics who fear Microsoft is drifting downwards. David Einhorn, a prominent hedge-fund manager whose fund holds shares in Microsoft, has publicly called for a change at the top of the firm, arguing that Mr Ballmer is "stuck in the past". So far, the company’s board, chaired by Mr Gates, has backed its chief executive. But if IBM’s history is a guide, Microsoft may yet end up jettisoning its leader. It can be inferred from the first paragraph that______.

A. Microsoft’s revenue is on a dramatic decline
B. people have a bleak view of Microsoft’s future
C. Microsoft kept pace with IBM in terms of sales
D. Microsoft once surpassed IBM in many aspects

A small group of Internet security specialists gathered in Singapore to start up a global system to make e-mail and e-commerce more secure, end the rapid growth of passwords and raise the bar significantly for Internet fraud, spies and troublemakers. The Singapore event included an elaborate technical ceremony to create and then securely store numerical keys that will be kept in three hardened data centers there, in Zurich and in San Jose, Calif. The keys and data centers are working parts of a technology known as Secure DNS, or DNSSEC. DNS refers to the Domain Name System, which is a directory that connects names to numerical Internet addresses. Preliminary work on the security system had been going on for more than a year, but this was the first time the system went into operation, even though it is not quite complete. The three centers are fortresses made up of five layers of physical, electronic and cryptographic security, making it virtually impossible to damage the system. Four layers are active now. The fifth, a physical barrier, is being built inside the data center. The technology is viewed by many computer security specialists as a ray of hope amid the recent cascade of data thefts, attacks, disruptions and scandals, including break-ins at Citibank, Sony, Lockheed Martin, RSA Security and elsewhere. It allows users to communicate via the Internet with high confidence that the identity of the person or organization they are communicating with is not being tricked or forged. Internet engineers like Dan Kaminsky, an independent network security researcher who is one of the engineers involved in the project, want to counteract three major deficiencies in today’s Internet. There is no mechanism for ensuring trust, the quality of software is uneven, and it is difficult to track down bad actors. One reason for these flaws is that from the 1960s through the 1980s the engineers who designed the network’s underlying technology were concerned about reliable, rather than secure, communications. That is starting to change with the introduction of Secure DNS by governments and other organizations. The event in Singapore capped a process that began more than a year ago and is expected to be complete after 300 so-called top-level domains have been digitally signed. Before the Singapore event, 70 countries had adopted the technology, and 14 more were added as part of the event. While large countries are generally doing the technical work to include their own domains in the system, the association of Internet security specialists is helping smaller countries and organizations with the process. It is suggested in Paragraph 4 that______.

A. the Net security system has protected lots of companies from data thefts
B. scientists sees the Net Security System as a promising technology
C. companies like Sony are undergoing an Internet security crisis
D. communication via the Internet makes people more confident

答案查题题库