单选题The policeman kept his eyes _____ on the screen of the computer to identify the criminal’s foot-prints.AfixedBfixingCbeing fixedDto fix

单选题
The policeman kept his eyes _____ on the screen of the computer to identify the criminal’s foot-prints.
A

fixed

B

fixing

C

being fixed

D

to fix


参考解析

解析:
本题考查动词的用法。句意:这个警察两眼直盯着电脑屏幕来辨别罪犯的脚印。eyes和fix是逻辑上的被动关系,即fix his eyes one the screen,所以A项符合题意。

相关考题:

Passage FourOne evening Mr. Green was driving home along a lonely country road. He had £ 100.00 in his pock et. At the loneliest part of the road, a man asked for a lift (搭车). Mr. Green told him to get into the car and continued his driving. When he talked to the man and learned that the man had been in prison for robbery and had broken out of prison two days before, Mr. Green was very worried.Suddenly he saw a police-car and had a bright idea. He just reached a small town where the speed limit (限制速度) was 30 miles an hour. But he drove the car as fast as it could go. He looked back and saw that the police-car had begun to chase (追) him. After a mile or so the police-car overtook (赶上) him and ordered him to stop. A policeman got out and came to Mr. Green's car. Mr. Green hoped that he could tell the policeman about the escaped robber, but he felt the man had put a gun against his back. The policeman took out his notebook and pencil, saying he wanted Mr. Green's name and address. Mr. Green asked to be taken to the police station, but the policeman said, "No, you will have to appear at the police station later." Mr. Green had to do as the policeman told him. The policeman wrote his name and address down, put his notebook and pencil back in his pocket and gave Mr. Green a talk about dangerous driving. Then Mr. Green started up his car again and drove on.Just as he reached the outskirts (郊区) of London, the passenger said, "! want to get off here." Mr. Green stopped the car, the man got out and said, "Thanks for the lift. You've been good to me. This is the least I can do in return (报答)." And he handed Mr. Green the policeman's notebook, which he stole while the policeman was talking to Mr. Green.46. The man asking for a lift was ______.A. a robber who robs driversB. a policeman who had worked in prisonC. a prisoner who had escaped from prisonD. a stranger with £ 100.00 in his pocket

With so many eyes ______on him, he was too nervous to speak.A. fixedB. fixingC. to fixD. being fixed

()day,a policeman came to his house. A.AB.OneC.TheD.This

He kept chewing the inside his lip a lot, _____ into complete silence.A. freezeB. freezingC. frozenD. being frozen

根据写作要求,写出一篇作文。Describe the following case and the criminal suspect according to the notice in about 100 words.WantedCrime: robberyVictim: a young manTime: at about 11. 00 p.m. last SaturdayPlace: on the 6th StreetLoss: a handbag with a computer, mobile phone, his passport and something elseAppearance of the suspect: short, slim; long, big face, big eyes with cruel eyesight; long,dirty fingernails; wear a worn jacket, a pair of jeans and trainersAnyone with info.: contact 110 at anytimeReward: RMB 5,000.

There are a lot of students in the reading room, most of with their eyes __ on and their heads bent over their books.A、whom; fixingB、them; fixedC、whom; fixedD、them; fixing

A policeman has to keep ________ his toes all the time he's on duty. A.atB.toC.onD.in

A programmed computer begins to show on its screen the figures you needA.to be switched onB.when switched onC.switching onD.being switche don

In his mother’s eyes, the writer_______.A. was a born artistB. always caused troubleC. was a problem solverD. worked very hard

39. I'm busy today. I'm going to have my CD player ______________.A. fixedB. fixingC. to fixD. fix

共用题干Computer CrimesMore and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his purpose can reap substantial rewards.Even worse,________(46)It's easy for computer crimes to go undetected if no one checks up on what the computer h doing.________(47),the criminal may walk away not only unpunished but with a growing recommendation from his former employers.Of course,we have no statistics on crime that go undetected.But it's disturbing to note how many of the crimes we do know about were detected by accident,________(48)The computer criminals who have been caught may have been the victims of uncommonly bad luck.For example,________(49)Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions.In another case,dissatisfied employees of the thief tipped off the company that was being robbed.Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too often,their demands have been met. Why?________(50)that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminalboasting in open court of how he juggled the most confidential records right under the noses of the company's executives,accountants,and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere._________(48)A:a certain keypunch operator complained of having to stay overtime to punch extra cards.B:It goes without saying that any one who breaks the law should be punished.C:Because company executives are afraid of the bad publicityD:a number of people who have done this and been caught at it have managed to get away without punishment.E:not by systematic inspections or other security procedures.F: But even if the crime is detected

The policeman asked him to identify the thief.A:capture B:separateC:name D:distinguish

A computer’s onboard LPT1 port fails. Which of the following I/O cards should be installed to fix this problem?()A、SerialB、ParallelC、FireWireD、USB

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题A rogue loose called a hacker could take control of the entire system by implanting his own instructions in the software and then he could program the computer to erase any sign ______ .Aof his being ever thereBhe ever has been thereCof his having ever been thereDof him having ever been there

单选题You are the network administrator for ExamSheet.net.  Two users, Peter and Keith, share a Windows 2000 Professional computer. The computer remains logged on with a shared user account named Kiosk at all times. Peter has limited dexterity, which prevents him from using the standard keyboard when completing his daily computing tasks. You configure his Windows 2000 Professional computer to use on-screen keyboard and ToggleKeys option. You have the accessibility option settings to the desktop. Keith does not want to use the on-screen keyboard when he uses the computer. You need to enable both users to quickly switch between their preferred settings. What should you do?()ACreate a roaming user profile for the Kiosk user account.BCreate an .acw file containing Peter’s preferred settings and save it to the desktop.CRun the Accessibility wizard and selectRestore Defaults.DUse Task Manager to end the Explorer.exe process.

单选题The result of deserved-punishment justice is .Athe criminal’s winning of a true lifeBthe criminal’s taking death penalty for the crime committed by himCthe criminal’s denial of his true selfDthe restoration of the criminal’s guilty self to the self before the crime

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题Playing games for hours at a time without a break, Pete sits at the computer screen until his eyes begin to water to water.APete sits at the computer screen until his eyes begin to waterBthe computer screen makes Pete’s eyes waterCPete’s eyes water when he sits at the computer screenDPete’s eyes, who water, sitting at the computer screenEPete sitting at the computer screen with watering eyes

单选题_____ARepair the woman’s computer.BFix his own computer.CHave a three-day holiday.DVisit the woman the next day.

单选题A computer’s onboard LPT1 port fails. Which of the following I/O cards should be installed to fix this problem?()ASerialBParallelCFireWireDUSB

单选题The Puritans suspected James I of England being a secret()because of his pro-Spanish foreign policy and his son.s Spanish marriage alliance.ABuddhistBCatholicCProtestantDMuslim

单选题According to the Bible, the concept of equality in justice means .Aa criminal must be severely punishedBa criminal must be given a punishment that is exactly the same as the crime he has doneCa criminal must be given a punishment that he deservesDa criminal must pay for his crime with his eyes and teeth

单选题The locker will()as long as your ship is here.ABe kept sealedBBe released from being sealedCBe kept signedDBe released from being signed

单选题General requirements for a vessel’s radiotelephone station log are that().Alogs must be kept in an orderly mannerBerasures are not allowedCit must identify the vessel's name and official numberDAll of the above

单选题You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()APlace the phone in Bluetooth discovery mode.BPlace the user’s computer in Bluetooth discovery mode.CAdd the phone and the computer to the same Bluetooth Personal Area Network (PAN).DInstall mobile phone synchronization software on the user’s computer.

单选题The policeman kept his eyes _____ on the screen of the computer to identify the criminal’s foot-prints.AfixedBfixingCbeing fixedDto fix