【单选题】【消耗次数:1】
I have lived in these crowded district_______2000.
for
since
at
参考答案:
复制
纠错
相关题目
【单选题】 I came to?Beijing?in 1991 and have been ?[填空] here ever since.
①  live
②  lives
③  lived
④  living
【单选题】 Its the second time that I __________ in Shanghai ! What great changes have taken place in Shang Hai. It is ten years since I __________ it last time.
①  have been ; left
②  had been ; left
③  have been ;had left
④  went ;had left
【单选题】 I ________ here since I moved here.
①  will work
②  worked
③  work
④  have been working
【单选题】 I_______here since I moved here.
①  will work
②  worked
③  work
④  have been working
【单选题】 Since you have already come, you _____ stay here for a couple of days.
①  might well
②  might as well
③  might have to
④  might
【单选题】 Alice: Natalie must have left since your plane arrived so late.Sam: To my surprise, I found her waiting for me at the airport.Alice: ___________
①  What a pity.
②  How kind.
③  Good for her.
④  No kidding.
【单选题】 Alice: Natalie must have left since your plane arrived so late. Sam: To my surprise, I found her waiting for me at the airport. Alice: ___________
①  What a pity.
②  How kind.
③  Good for her.
④  No kidding.
【单选题】 He _______ driving me home, even though I told him I lived nearby.
①  insisted on
②  insisted at
③  insisted that
④  insisted in
【单选题】 I’m writing to you from London in a new flat. I _______ here since 2005.
①  was
②  have been
③  is being
【单选题】 I was to have a trip abroad if _____.
①  I had not been fired
②  I was not fired
③  my boss won’t have fired me
④  I were not fired
随机题目
【判断题】 恶意代码的关键技术包括:生存技术、攻击技术和隐藏技术。
①  正确
②  错误
【判断题】 从工作原理角度看,防火墙主要可以分为网络层和数据层。
①  正确
②  错误
【多选题】 使用基于路由器的防火墙使用访问控制表实现过滤,它的缺点有:( )。
①  路由器本身具有安全漏洞
②  分组过滤规则的设置和配置存在安全隐患
③  无法防范“假冒”的地址
④  对访问行为实施静态、固定的控制与路由器的动态、灵活的路由矛盾
【多选题】 按照防火墙对数据的处理方法,可将防火墙分为( )两类。
①  数据包过滤防火墙
②  DNS防火墙
③  代理防火墙
④  网络服务防火墙
【多选题】 典型的防火墙体系结构包括( )。
①  双宿主机结构
②  代理主机结构
③  屏蔽主机结构
④  屏蔽子网结构
【多选题】 防火墙不能防止以下哪些攻击行为( )。
①  内部网络用户的攻击
②  传送已感染病毒的软件和文件
③  外部网络用户的IP地址欺骗
④  数据驱动型的攻击
【单选题】 入侵检测系统的第一步是:( )。
①  信号分析
②  信息收集
③  数据包过滤
④  数据包检查
【单选题】 端口扫描的原理是向目标主机的( )端口发送探测数据包,并记录目标主机的响应。
①  FTP
②  UDP
③  TCP/IP
④  WWW
【单选题】 随着Internet发展的势头和防火墙的更新,防火墙的哪些功能将被取代( )。
①  使用IP加密技术
②  日志分析工具
③  攻击检测和报警
④  对访问行为实施静态、固定的控制
【多选题】 常见的网络攻击方法不包括( )。
①  端口扫描
②  口令破解
③  缓冲区溢出
④  拒绝服务
⑤  网络嗅探