题目内容 (请给出正确答案)
提问人:网友z*****n 发布时间:2022年4月6日 06:39
[单项选择题]

mathematics一词来自希腊语máthēma,其希腊语原意是()。

A.能学能教的东西

B.逻辑严密的东西

C.可以记录的东西

D.用于推演的东西

参考答案
十点题库官方参考答案 (由十点题库聘请的专业题库老师提供的解答)
更多“mathematics一词来自希腊语máthēma,其希腊语”相关的问题
风电场应综合考虑各种发电出力水平和接入系统各种运行工况下的稳态、暂态、动态过程,配置足够的动态无功补偿容量,且动态调节的响应时间不大于()ms。风电场应确保场内无功补偿装置的动态部分自动调节,确保电容器、电抗器支路在紧急情况下能快速正确投切。
A.10
B.20
C.30
D.40
点击查看答案
生理学角度的体温指的是()。
A.舌下温度
B.腋下温度
C.直肠温度
D.机体表层平均温度
E.机体深部平均温度。
点击查看答案
Text 2 SoBig. F was the more visible of the two recent waves of infection because it propagated iself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some S00,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected. Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. P was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading’ z it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory. Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting. One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings"—signals that checked for the presence of other computers. Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organising trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.
Text 2
SoBig. F was the more visible of the two recent waves of infection because it propagated iself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some S00,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.
Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. P was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading’ z it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.
Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.
One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings"—signals that checked for the presence of other computers.
Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organising trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.
点击查看答案
通过力学试验,如拉伸、冲击、镦粗、楔形轧制、扭转等,可以比较各种金属()的高低。
A . 硬度
B . 塑性
C . 可靠性
D . 变形量
点击查看答案
人类对环境的适应包括生物生态适应和社会生态适应。
点击查看答案
“某商业银行有证券类、信贷类和中间业务类等产品类别”是对产品组合()的描述。
A.深度
B.关联性
C.宽度
D.密度
点击查看答案
(二) 某省城镇就业人员增长明显快于乡村。2007年全省城镇就业人员比1978年增长2091.4万人,增加3.4倍,年均增长6%;所占比重达到43.5%,上升23.8个百分点。全省乡村就业人员比1978年增加1020.2万人,增长40.8%,年均增长1.2%;所占比重为56.5%,下降23.8个百分点。 非农产业成为就业的主导产业。2007年全省第三产业就业人员比1978年增加1574万人。增加2.9倍,年均增长7.1%,所占比重达到了34%,上升16.6个百分点,成为拉动就业增长的主要力量。与1978年相比,第一产业就业人员减少85.7万人,所占比重下降了37.0个百分点;第二产业就业人员增加1623.3万人,所占比重上升20.4个百分点。 非公有经济的就业比例迅速上升。1978年全省个体经济就业人员仅有2353人。2007年个体工商户就业人员达到了397.8万人,所占比重为6.4%;私营企业就业人员达到512.7万,比重为8.4%;港澳台企业就业人员27.4万人,比重为0.4%;外商投资企业就业人员108.3万人,比重1.7%。
A.1.3B.4.1C.8.7D.无法计算
点击查看答案
简述王小波的小说“时代三部曲”的主题内涵。
点击查看答案
柴油机按活塞连杆的结构特点可分为筒状活塞式和十字头式,目前大型低速二冲程柴油机均采用十字头式结构。
点击查看答案
主要以神经系统症状为主的食物中毒是 A.沙门菌食物中毒B.霉变甘蔗中毒 C.赤霉病麦中毒 D.四季豆中毒 E.杏仁氰苷中毒
点击查看答案
OGTT试验时应注意的事项哪项除外()
A.禁烟
B.禁酒
C.可以剧烈运动
D.停服利尿药
E.停服避孕药
点击查看答案
A.抑制呼吸 B.兴奋呼吸 C.两者均是 D.两者均不是
A.抑制呼吸
B.兴奋呼吸
C.两者均是
点击查看答案
在刑事诉讼中,证据保全主要由()、检察机关主动进行。
点击查看答案
工程建设定额和生产力发展水平相适应,反映出工程建设中生产消费的客观规律,这体现了工程建设定额的( )特点。
A.科学性
B.系统性
C.统一性
D.权威性
点击查看答案
启发的首要问题是调动学生学习的()。
A.创造性
B.交往性
C.多样性
D.主动性
点击查看答案
客服
TOP