重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 英语> 大学英语
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[单选题]

Your nerve system can't ____ between the imagine experience and a real one.

A.tell a difference

B.find the difference

C.tell the difference

D.find a difference

答案
查看答案
更多“Your nerve system can't ____ between the imagine experience and a real one.”相关的问题

第1题

Your nerve system reacts Ato Bwhat you imagine to be true Con much the same way that it Dd
oes to real experiences.

点击查看答案

第2题

Stress can affect the respiratory system by_____.A.decreasing the pulse rateB.a loss of ca

Stress can affect the respiratory system by_____.

A.decreasing the pulse rate

B.a loss of carbon dioxide

C.causing breathing problems

D.causing asthma

点击查看答案

第3题

2016年大学生物专业英语期末考试英文短文1翻译答案

1. “The Nobel Prize in Physiology or Medicine 2004”Press Release(15分)

4 October 2004

The Nobel Assemblyat Karolinska Institutet has today decided to award The Nobel Prize in Physiology or Medicine for 2004 jointly toRichard Axel and Linda B. Buckfor their discoveries of "odorant receptors and the organization of the olfactory system"

Summary

The sense of smell long remained the most enigmatic of our senses. The basic principles for recognizing and remembering about 10,000 different odours were not understood. This year's Nobel Laureates in Physiology or Medicine have solved this problem and in a series of pioneering studies clarified how our olfactory system works. They discovered a large gene family, comprised of some 1,000 different genes (three per cent of our genes) that give rise to an equivalent number of olfactory receptor types. These receptors are located on the olfactory receptor cells, which occupy a small area in the upper part of the nasal epithelium and detect the inhaled odorant molecules.

Each olfactory receptor cell possesses only one type of odorant receptor, and each receptor can detect a limited number of odorant substances. Our olfactory receptor cells are therefore highly specialized for a few odours. The cells send thin nerve processes directly to distinct micro domains, glomeruli, in the olfactory bulb, the primary olfactory area of the brain. Receptor cells carrying the same type of receptor send their nerve processes to the same glomerulus. From these micro domains in the olfactory bulb the information is relayed further to other parts of the brain, where the information from several olfactory receptors is combined, forming a pattern. Therefore, we can consciously experience the smell of a lilac flower in the spring and recall this olfactory memory at other times.

Richard Axel, New York, USA, and Linda Buck, Seattle, USA, published the fundamental paper jointly in 1991, in which they described the very large family of about one thousand genes for odorant receptors. Axel and Buck have since worked independent of each other, and they have in several elegant, often parallel, studies clarified the olfactory system, from the molecular level to the organization of the cells.

点击查看答案

第4题

It is defined that facing an expert system ______. A.is like interacting with a human who has some

It is defined that facing an expert system ______.

A.is like interacting with a human who has some type of expertise

B.can help you learn things better

C.makes you release your nervousness in front of an expert

D.can save your time to meet an expert

点击查看答案

第5题

__your system so the software(软件) will always keep new.

A. Update

B. Change

C. Delete

D. Destroy

点击查看答案

第6题

Put yourself into the position of an English teacher in China. What are your goals and the
goals of the students and the educational system in the teaching and learning of English? When the goals do not converge, how can you reconcile the differences between them?

点击查看答案

第7题

The complete details of a crude oil washing system aboard your vessel,including the operat
ing sequences and procedures,design characteristics,a description of the system,and required personnel will be found in the ______.

A.Oil Transfer Procedures Manual

B.Crude Oil Washing Operations and Equipment Manual

C.Code of Federal Regulations

D.Crude Oil Washing addendum to the Certificate of Inspection

点击查看答案

第8题

Examine the following two statements about language, and discuss the similarities and diff
erences between them. Do you agree with the two statements? Explain your answer. (1) Sapir (1921; Language): "Language is a purely human and non-instinctive method of communicating ideas, emotions and desires by means of voluntarily produced symbols. (p.8). (2) Bloch and Trager (1942; Outline of Linguistic Analysis) : "A language is a system of arbitrary vocal symbols by means of which a social group co-operates. " (p. 5).

点击查看答案

第9题

Computer Viruses 计算机病毒 Introduction A computer virus is a piece of software programmed to pe

Computer Viruses

计算机病毒

Introduction

A computer virus is a piece of software programmed to perform one major task: to replicate. Viruses accomplish their reproductive task by preying on other computer files, requiring a host program[1]as a means of survival. Viruses gain control over their host in various ways, for example by attaching their infected code to the end of a host program and misguiding the header information at the beginning of the file so that it points toward itself rather than the legitimate program. Therefore, when an infected host program is run, the virus gets executed before the host. The host program can be almost anything: an application, part of the operating system's, part of the system boot code, or a device driver. The virus continues to spread, moving from file to file in this infectious manner.

In addition to its propagation mission, many viruses contain code whose purpose is to cause damage. In some viruses, this code is activated by a trigger mechanism.[2]A trigger condition may be linked to the number of times the host file is run, or it could be a response to a particular date, time or random number. In other cases, the damage could occur continuously or on a random basis. Of the 11,000 known viruses present today, more than 2,000 have been diagnosed as being data destructive.

Types of Viruses

Several types of viruses exist and are classified according to their propagation patterns.

1. Executable File Infectors

These viruses spread infection by attaching to an executable file, misdirecting the header information, and executing before the host file. It is very common for these viruses to load themselves into memory once their infected host file is launched. From there, they monitor access calls, infecting programs as executed.

2. Boot Sector Infectors

This type of virus overwrites the original boot sector, replacing this portion of code with itself, so it is the first to load and gain control upon system boot, even before DOS. In order for boot block viruses to replicate, it is usually necessary to boot the computer from an infected floppy disk. Upon system boot, the virus will jump from the infected floppy disk to the hard disks partition table.

3. Partition Table Infectors

These viruses attack the hard disk partition table by moving it to a different sector and replacing the original partition table with its own infectious code. These viruses will then spread from the partition table to the boot sector of floppy disks as floppies are accessed. 4. Memory Resident Infectors

Many viruses load themselves into memory while altering vital system services. For example, some viruses modify the operating system's Execute Program service in such a way that any executed program is immediately infected. Other viruses modify the operating system in order to camouflage their existence. These viruses are called Stealth Viruses.

Why Are Viruses Written?

Bulgaria is often referred to as the "Virus Factory" because the country accounts for the highest percentage of new virus creation. Several cultural factors attribute to this state. Primarily, the country offers no software copyright protection, so legitimate software programmers are not rewarded financially for their work. And there are no laws in place to prohibit the authorship of new viruses. In fact, virus source code is often posted on international bulletin boards for anyone to access. Certainly, this is not the case in the United States, so why do we maintain the second highest level of virus authorship? Today's viruses are being written to attack a specific person, company or program. There are countless stories of disgruntled employees who seek vengeance by writing viruses to attack their former employer's computer system.

How Are Viruses Transmitted?

Because a virus is nothing more than a piece of software, it can be acquired in the same way as legitimate programs. Viruses have reportedly been transmitted through shrink- wrapped retail software.[3]Unsuspecting sales representatives often act as carriers by demonstrating infected programs. Newly purchased computers, which had their hard disks formatted by service technicians, have been returned with viruses. These pests travel over phone lines through programs sent by modem. Bulletin boards do occasionally transmit viruses. The most common means of contracting a virus, however, is through the use ot floppy disks. Piracy of software, in particular, expedites viral spread, as do floppy disks traveling from one computer to another.

We Are All at Risk

All personal computer users are at risk for viral infection. Several events, trends and technological inroads have combined in the past few years to increase our vulnerability to infection. The proliferation of local area networks, the downloading of information from mainframes to desktop computers, our increased reliance on personal computers to store mission critical data, the arrival of electronic bulletin boards, the globalization of communications, the gained popularity of shareware, the growing use of remote communications, the increased sophistication of end users, the portability of data, the casual spread of software via piracy, and the staggering rate of new virus creation all contribute to increase our risk of virus infection.

A Special Threat to Networks

Viruses present a special threat to networks because of the inherent connectivity they provide and because of the potential for widespread data loss. Once a virus infects a single networked computer, the average time required for it to infect another workstation is anywhere from 10 to 20 minutes. With a propagation time of this magnitude, a virus can paralyze an entire network in several hours.

Virus Infection Symptoms

The most successful virus has no symptoms at all. Your computer may be infected, and you will notice no change in the normal behavior of your computer. The only way to be aware of such viruses is to use automated virus detection tools. Some less sophisticated viruses may exhibit "visible" symptoms such as:

1) Changes in program length

2) Changes in the data or time stamp

3) Longer program load times

4) Slower system operation

5) Unexplained disk activities

6) Unexplained reduction in memory or disk space

7) Bad sectors on your floppy

8) Disappearing programs

9) Unusual error messages

10) Unusual screen activity

11) Access lights turn on for non-referenced drive

12) Failed program execution

It is important to remember that some viruses may not exhibit any visible symptoms at all. Don't count on your intuition as your only tool for detecting viruses.

Anti-Virus Tools

In dealing with today's sophisticated viruses, intuition and strict employee policies are not enough. The more carefully engineered virus programs exhibit no visible symptoms at all until it is too late. Your computer may be infected with a virus without any noticeable alteration in functionality. Therefore, relying solely on visible side effects, such as slower system operation, longer program load time or unusual screen activity as a means of early detection, may not prove as reliable as it once did. You can no longer afford to count on your intuition as your only tool for detecting viruses. While information systems managers should establish employee guidelines and policies to lessen the potential for infection, strict rules alone will not insure complete protection. What about the shrink-wrapped software program purchased by your company that was later found to be infected by a virus? Or what about the hard drive that was sent out for repair by a service technician, only to[4]have it returned with a virus? The only way to prevent viruses from mysteriously entering your company is to reinforce the security programs already in place with automated virus detection tools.

Defending against Viruses

Following are some tips in helping to combat the growing threat of viral infection.

1) Use an automated virus detection tool, such as Fifth Generation Systems Untouchable virus protection software.

2) Regularly perform a backup of your data with a backup program, such as Fifth Generation Systems Fastback Plus.[5]

3) Prevent unauthorized access to your computer by using a security access program, such as Fifth Generation Systems Disklock.[6]

4) Use write-protected tabs on all program disks before installing any new software. If the software does not allow this, install it first, then apply the write-protected tabs.

5) Do not install new software unless you know it has come from a reliable source. For instance, service technicians and sales representatives are common carriers of viruses. Scan all demonstration or repair software before use.

6) Scan every floppy disk before use and check all files downloaded from a bulletin board or acquired from a modem.

7) Educate employees. As the adage goes, an ounce of prevention is worth a pound of cure.

8) Do not boot from any floppy disk[7], other than a clean, DOS based disk.

9) Avoid sharing software and machines.

10) Store executable and other vital system parameters on a bootable DOS based disk and regularly compare this information to the current state of your hard drive.

Notes

[1]requiring a host program:host表示“主人”、“东道主”。此处a host program可译成“主机程序”。

[2]a trigger mechanism:触发装置。

[3]shrink-wrapped retail software:用收缩塑料薄膜包装的零售软件。

[4]only to:不定式短语表示结果;翻译成“结果……”,如:He made a long speech only to show his ignorance of the subject.他讲一大段话,结果只暴露出他对这门学科一无所知。

[5]Fifth Generation Systems Fastback Plus:第五代生成系统快速备份。

[6]Fifth Generation Systems Disklock:第五代生成系统磁盘锁。

[7]Do not boot from any floppy disk. boot意指“引导”、“启动”。此句译为“不要直接从软盘启动计算机”。

Choose the best answer for each of the following:

点击查看答案

第10题

Part ADirections: Read the following three texts. Answer the questions on each text by cho

Part A

Directions: Read the following three texts. Answer the questions on each text by choosing A, B, C or D. Mark your answers on ANSWER SHEET 1.

The United States Congress is a bicameral legislature. Two Houses-Senate and House of Representatives make the laws. Before a bill may be sent to the President to sign, both houses must approve. When great agreement exists on a bill, the law moves quickly. However, most suggested laws are complex and relate to interests and conflicts which need debate and careful consideration.

Both houses of Congress use the committee system to handle the numerous bills. A bill is referred to the committee responsible for that category -- whether taxation, foreign affairs, housing or whatever. In the committee the bill is studied, arguments are collected for and against, and advice is gathered from experts on the subject. Citizens have the chance to influence legislation through the committee system. If the committee votes favorably, the bill goes before the entire house. Usually, committee approval means favorable action by the Senate and House of Representatives.

As a result, membership on the more important committees is eagerly sought. How long a senator or representative has served in Congress is most important in assigning committee memberships. Usually the majority political party receives a majority of the memberships of each committee. In this way the party controls decisions because the real work and power of Congress lies in the system of committees. Some people protest that this system restricts laws, but most see this as the system that works best.

By using the context and word part clues, we may conclude that "bicameral" means _______.

A.Republicans and Democrats

B.two Houses

C.congressional system

D.law making procedure

点击查看答案

第11题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 An antivirus program (1) a virus

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

An antivirus program(1)a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An antivirus program also can be used to create a checksum for(2)files on your disk, save the checksums in a special file, and then use the statistic to(3)whether the files are modified by some new virus. Terminate and stay resident (TSR) programs can check for unusual(4)to access vital disk areas and system files, and check files you copy into memory to be sure they are not(5).

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝