单选题American adults tend to _____ than teenagers.Acare more about information overloadBlike using computers moreCdislike using computers moreDface less danger

单选题
American adults tend to _____ than teenagers.
A

care more about information overload

B

like using computers more

C

dislike using computers more

D

face less danger


参考解析

解析:
本题询问与青少年相比,美国成年人更加倾向于什么。根据第二段第二句话“A separate survey of children aged 10-17 shows that they have a more positive attitude about computers than adults do”可知美国的青少年对电脑的态度比成年人还要积极,由此可推断出美国成年人与青少年相比,不大喜欢电脑,故选选择C项。

相关考题:

Previous studies show that parents tend to be aware of sleep problems in older children and adolescents and that pediatric practitioners are ( ) likely to identify sleep problems in these age group.:A、less…lessB、less…moreC、more…lessD、more…more

Today there are ()computers in our homes and offices than there are people who live and work in them. A.lessB.moreC.littleD.lotsof

John is more interested in computers than I am. 翻译

I have _____ question to ask you. A、more oneB、any moreC、some moreD、one more

How many years of experience do you have with deploying and maintaining a virtualization infrastructure using Microsoft desktop or server virtualization technologies?() A.I have not done this yet.B.Less than 6 monthsC.More than 6 months but less than 1 yearD.1-2 yearsE.2-3 yearsF.More than 3 years

Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.A.Central Processing UnitB.integrated circuitsC.Hard diskD.software integration

4. A fat man should eat ________food and take ________ exercise.A. less,lessB. fewer,moreC. less,moreD. more, fewer

In using Loran-C,skywave reception gives greater range but is ______.A.only accurate during daylight hoursB.much less accurateC.only accurate at twilightD.more accurate than using ground waves

Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

Today there are ()computers in our homes and offices than there are people who live and work in them.A、lessB、moreC、littleD、lotsof

Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

Which of the following is a differentiating feature of file permissions as compared to share permissions?()A、 File permissions are less granular than share permissions.B、 Full control can only be set using file permissions.C、 File permissions are more granular than share permissions.D、 Full control can only be set using share permissions.

A 100 pair cable is typically used to connect:()A、telephony distribution.B、businesses with more than 75 computers.C、security cameras.D、computer labs with more than 20 computers.

How many years of experience do yo u have with deploying and maintaining a virtualization infrastructure using Microsoft desktop or server virtualization technologies?()A、I have not done this yet.B、Less than 6 monthsC、More than 6 months but less than 1 yearD、1 - 2 yearsE、2 - 3 yearsF、More t han 3 years

How many years of experience do you have using any version of Windows Server? ()A、I have not done this yet.B、Less than 6 monthsC、More than 6 months but less than 1 yearD、1-2 yearsE、2-3 yearsF、More than 3 years

How many years of experience do you have with deploying and maintaining a virtualization infrastructure using any desktop or server virtualization technologies?()A、I have not done this yet.B、Less than 6 monthsC、More than 6 months but less than 1 yearD、1 - 2 yearsE、2 - 3 yearsF、More than 3 years

How many years of experience do you have using any version of Windows Server? ()A、NoneB、Less than 3 monthsC、3-6 monthsD、More than 6 months but less than 1 yearE、1-2 yearsF、2-3 yearsG、3-4 years

How many years of experience do you have with deploying and maintaining a virtualization infrastructure using any desktop or server virtualization technologies?()A、I have not done this yet.B、Less than 6 monthsC、More than 6 months but less than 1 yearD、1-2 yearsE、2-3 yearsF、More than 3 years

单选题What types of orders are exempt from using the IPCC Express Configuration and Ordering Tool?  ()Aorders for coresident deployments  Borders for adding more seats  Corders for upgrading from standard  Dorders with less than five seats  Eall orders require using the IPCC Express Configuration and Ordering Tool

单选题When you pass information onto your brain, for a boy ______.Ayou get more information than a girlByou get less information than a girlCyou collect information faster than a girlDyou collect information more slowly than a girl

单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()AFile permissions are less granular than share permissions.BFull control can only be set using file permissions.CFile permissions are more granular than share permissions.DFull control can only be set using share permissions.

单选题American adults tend to ______ than teenagers.Acare more about information overloadBlike using computers moreCdislike using computers moreDface less danger

问答题Practice 4  Read the following text(s) and write an essay to  1) summarize the main points of the text(s),  2) make clear your own viewpoint, and  3) justify your stand.  In your essay, make full use of the information provided in the text(s). If you use more than three consecutive words from the text(s), use quotation marks (“ ”).  You should write 160—200 words on the ANSWER SHEET.  The information and computer technologies have boosted the efficiency and convenience of people’s work and study. Their application in school education has provided teachers and students with new approaches to knowledge and information. There is a heated discussion about whether computers will replace teachers. The following are the supporters’ and opponents’ opinions.  Supporters:  With the advanced computer and Internet, children can get the learning material whenever they want.  Online teaching is becoming more and more popular that students can get planned lessons online. After each class, there is homework for them to do. Both the learning and practice can be done on computers.  From computers students can learn something that they are interested in so that they won’t be restricted to the subjects that they are taught at school. Therefore, students will have the opportunity to achieve an all-around development.  Opponents:  Students need to communicate with teachers and get instructions from them whenever they have troubles in their study. Computers are only cold devices that will affect children’s ability to have face-to-face communication.  Education is not only about imparting the knowledge, but also being a useful person. So students need to learn some useful values to be a good person which sometimes cannot be easily learned from computers.  Children who use computer will learn to communicate with machines instead of people. There is a risk that they will be a generation of social illiterates.

单选题What is the writer’s opinion about books and computers?APeople won’t need books any more.BBooks won’t be replaced by computers.CPeople prefer to find information in books.DComputers have already replaced books.

单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A File permissions are less granular than share permissions.B Full control can only be set using file permissions.C File permissions are more granular than share permissions.D Full control can only be set using share permissions.

单选题A 100 pair cable is typically used to connect:()Atelephony distribution.Bbusinesses with more than 75 computers.Csecurity cameras.Dcomputer labs with more than 20 computers.

问答题Some people say that computers are making the world lonely and dehumanized. What is your opinion? State your opinion in no less than about 160 words, and write it on the Answer Sheet.

单选题Which of the following statements is NOT true? _____AThere are both advantages and disadvantages in using a word professor.BThe British companies care much for the health of the people using word processors.CThe technology in the field of computers has been greatly advanced over the last ten years.DUsing world processors, secretaries can get more time to do more interesting work for their bosses.