注意:此页面搜索的是所有试题
2024年国家开放大学答案
社会保险法是国家、单位和( )按照“社会风险、社会化解”的原则对年老、疾病、失业、伤残、生育等社会风险进行管理的法律规范(单选题)
.集体
.社区
.家庭
.个人
领导者要从以下( )等方面做好表率。(多选题)
.以身作则
.对企业文化始终如一的关注
.天天讲、时时讲
.只要授权相关部门抓企业文化建设
药品注册管理办法 属于( )。(单选题)
.药事法律.,.
药事法规.,.
药事规章.,.
行政法规
梅德尼克是一位联想论的创造力理论学者,他认为创造力是一种本能反应的结果。(判断题)
.对
.错
《农民专业合作社法》规定了哪些支持农民专业合作社发展的扶持政策措施(简答题)
当基极电流较大时,集-射极电压接近0,集电极电流达到最大值,此时三极管处于_______状态;当基极电流小于等于0时,集电极电流为零,集-射极间电压UCE=UCC,此时三极管处在_______状态。()(单选题)
.饱和,放大\t
.放大,截止
.截止,放大
.饱和,截止
如为安全的需要,窗玻璃可优先选用( )。(单选题)
.压花玻璃
.双层中空玻璃
.钢化玻璃
.普通平板玻璃
个人独资企业解散的,财产按顺序首先清偿( )(单选题)
.所欠银行贷款
.所欠职工工资和社会保险费用
.所欠税款
.其他债务
裱糊施工(名词解释)
菲利普斯曲线的基本含义是( )(单选题)
.失业率和通货膨胀率同时上升.,.
失业率和通货膨胀率同时下降.,.
失业率上升,通货膨胀率下降.,.
失业率与通货膨胀率无关
由于地下水的存在,给深基坑施工很多问题,包括( )。(多选题)
.基础施工
.基坑开挖
.边坡稳定
.基底隆起
.浮力及防渗漏
表单元素包括哪些?(简答题)
A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.
Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year.s total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let.s first examine some common virus types:
Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.
Trojan Horses - This is a program that doesn.t replicate when entering a system but can be effectively used to open .back doors.. Trojan Horses allow hackers to take control over a particular system or to steal very important data.
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users. computers get infected without even having to click open email attachment or any program, etc.
Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer virus is a computer program that is created to make and spread 1 of itself.
A.programs
B.virus
C.copies
D.files
2.Worm spread itself except by 2 .
A.network
B.E-mail
C.program
D.hardware
3.Antivirus program can scan and 3 virus.
A.clean
B.produce
C.replicate
D.make
4.Trojan Horses 4 .
A.quickly replicate itself and gradually attache to files, programs or the hard drive.
B.infect the computer without even having to click open email attachment or any program.
C.allow hackers to take control over a particular system or to steal very important data.
D.avoid the virus to attack computer.
5.According to BusinessWeek, the 5 attacks reported in the first half of 2003 nearly match previous year.s total number.
A.86,404
B.76,404
C.56,354
D.34,876__2__(完形填空)
.A
.B
.C
.D
在农村集体资产中,我们一般将不具有实物形态,而有经济价值的资产称为()。(单选题)
.无形资产
.有形资产
.递延资产
.流动资产
电路中任意两个结点之间连接的电路统称为支路。( )(判断题)
.对
.错
.集体
.社区
.家庭
.个人
领导者要从以下( )等方面做好表率。(多选题)
.以身作则
.对企业文化始终如一的关注
.天天讲、时时讲
.只要授权相关部门抓企业文化建设
药品注册管理办法 属于( )。(单选题)
.药事法律.,.
药事法规.,.
药事规章.,.
行政法规
梅德尼克是一位联想论的创造力理论学者,他认为创造力是一种本能反应的结果。(判断题)
.对
.错
《农民专业合作社法》规定了哪些支持农民专业合作社发展的扶持政策措施(简答题)
当基极电流较大时,集-射极电压接近0,集电极电流达到最大值,此时三极管处于_______状态;当基极电流小于等于0时,集电极电流为零,集-射极间电压UCE=UCC,此时三极管处在_______状态。()(单选题)
.饱和,放大\t
.放大,截止
.截止,放大
.饱和,截止
如为安全的需要,窗玻璃可优先选用( )。(单选题)
.压花玻璃
.双层中空玻璃
.钢化玻璃
.普通平板玻璃
个人独资企业解散的,财产按顺序首先清偿( )(单选题)
.所欠银行贷款
.所欠职工工资和社会保险费用
.所欠税款
.其他债务
裱糊施工(名词解释)
菲利普斯曲线的基本含义是( )(单选题)
.失业率和通货膨胀率同时上升.,.
失业率和通货膨胀率同时下降.,.
失业率上升,通货膨胀率下降.,.
失业率与通货膨胀率无关
由于地下水的存在,给深基坑施工很多问题,包括( )。(多选题)
.基础施工
.基坑开挖
.边坡稳定
.基底隆起
.浮力及防渗漏
表单元素包括哪些?(简答题)
A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.
Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year.s total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let.s first examine some common virus types:
Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.
Trojan Horses - This is a program that doesn.t replicate when entering a system but can be effectively used to open .back doors.. Trojan Horses allow hackers to take control over a particular system or to steal very important data.
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users. computers get infected without even having to click open email attachment or any program, etc.
Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer virus is a computer program that is created to make and spread 1 of itself.
A.programs
B.virus
C.copies
D.files
2.Worm spread itself except by 2 .
A.network
B.E-mail
C.program
D.hardware
3.Antivirus program can scan and 3 virus.
A.clean
B.produce
C.replicate
D.make
4.Trojan Horses 4 .
A.quickly replicate itself and gradually attache to files, programs or the hard drive.
B.infect the computer without even having to click open email attachment or any program.
C.allow hackers to take control over a particular system or to steal very important data.
D.avoid the virus to attack computer.
5.According to BusinessWeek, the 5 attacks reported in the first half of 2003 nearly match previous year.s total number.
A.86,404
B.76,404
C.56,354
D.34,876__2__(完形填空)
.A
.B
.C
.D
在农村集体资产中,我们一般将不具有实物形态,而有经济价值的资产称为()。(单选题)
.无形资产
.有形资产
.递延资产
.流动资产
电路中任意两个结点之间连接的电路统称为支路。( )(判断题)
.对
.错