【单选题】【消耗次数:1】
She didn’ t come to the party last Sunday._____, she must have made the party more exciting.
If she came
Would she come
Had she come Did she come
参考答案:
复制
纠错
相关题目
【单选题】 Mary will not be able to come to the birthday party as she is ____ with a cold.
①  laid out
②  laid up
③  laid by
④  laid down
【单选题】 Mary will not be able to come to the birthday party as she is _____with a cold.
①  laid out
②  laid up
③  laid by
④  laid down
【单选题】 She told me ?[填空]come and take a pen.
①  not
②  to
③  that
④  in
【单选题】 _______ she tried her best, she didn’t succeed.
①  Though
②  When
③  If
④  After
【单选题】 —Would you like to come to our party this weekend?—______.
①  Yes, it was an interesting party
②  No, I’d like to
③  I’m sorry that I won’t be able to attend the party
④  No
【单选题】 She was so _____ in her job that she didn’t hear someone knocking at the door.
①  attracted
②  drawn
③  absorbed
④  concentrated
【单选题】 She will have to find somewhere else to work, for she can’t ____this loud noise any longer.
①  come up with
②  catch up with
③  keep up with
④  put up with
【多选题】 ------ Why did she visit Africa?------ She went there____________________ .
①  for research work
②  to do research
③  to gather information
④  to collect information
【判断题】 Has she been listening? Yes, she has./ No, she hasn’t.
①  正确
②  错误
【单选题】 ——Tomorrow ____ my birthday. I’d like you and Jane to come. ——I’m not sure if she ____ free.
①  willbe;is
②  isgoingto;is
③  is;is
④  is;willbe
随机题目
【单选题】 以下哪一项不是在网络攻击后,消除痕迹的常用手段( )。
①  清除系统日志
②  删除临时文件
③  删除临时用户
④  撤销所有操作
【单选题】 为了加强口令的管理,防止被攻击,以下措施不正确的是( )。
①  复杂的口令记录在笔记本上
②  加长口令长度
③  增加口令的复杂度
④  定期更改口令
【单选题】 欺骗类攻击的常见形式有Web欺骗和( )。
①  IP欺骗
②  地址欺骗
③  MAC欺骗
④  电话欺骗
【单选题】 通过网络,从美国发送一条消息到中国大概需要( )毫秒的时间。
①  6
②  60
③  600
④  6000
【单选题】 典型的控制类攻击包括( )。
①  口令攻击和用户名攻击
②  病毒攻击和特洛伊木马攻击
③  口令攻击和病毒攻击
④  口令攻击和特洛伊木马攻击
【判断题】 漏洞类攻击利用的是系统、协议、软件本身存在的安全缺陷进行攻击的。
①  正确
②  错误
【判断题】 预防探测类攻击的常用方法是安装杀毒软件。
①  正确
②  错误
【判断题】 红色代码病毒主要感染的是个人电脑.
①  正确
②  错误
【判断题】 欺骗类攻击通过冒充合法网络主机骗取敏感信息,或者通过配置、设置一些假信息来实施欺骗攻击。
①  正确
②  错误
【判断题】 木马可以通过电子邮件、下载、恶意网页、远程线程注入等多种方式植入到目标主机中。
①  正确
②  错误