【单选题】【消耗次数:1】
34.I heard that you really had a wonderful time at Johns birthday party, _____?
didntI
didntyou
hadntyou
willyou
参考答案:
复制
纠错
相关题目
【单选题】 If you don’ t go to his birthday party next Friday,_____.
①  so do I
②  so will I
③  nor do I
④  nor will I
【单选题】 —Why didnt you come to join her party?—I______, but I had to deal with something urgent.
①  would have
②  should
③  would do
④  was going to have
【单选题】 23.____time we had at the dinner party !
①  Howwonderful
②  Whatawonderfultime
③  Howawonderfultime
④  Whatwonderfultime
【多选题】 You speak ____________ you had really been there.
①  as soon as
②  as many as
③  as if
④  as though
【单选题】 A: Thank you for inviting me to your birthday party. B: [填空].
①  Dont be so polite
②  You are so polite
③  You are quite welcome
④  Dont use thanks
【判断题】 A: Have a wonderful time. B: You, too.
①  正确
②  错误
【单选题】 If I had had enough time, I __________ it well.
①  would do
②  would have done
【单选题】 —Why didn’t you come to join her party? —I______, but I had to look after my ill mother.
①  would have
②  should
③  would do
④  was going to have
【单选题】 —Don’t forget to come to my birthday party tomorrow.—I ____ .
①  don’t
②  won’t
③  can’t
④  haven’t
【单选题】 As I turned around, I heard a loud noise [] for the bookshelf had collapsed.
①  comma
②  semicolon
随机题目
【判断题】 用户访问是网络攻击的第一步。
①  正确
②  错误
【判断题】 防火墙可以阻止攻击者对于木马的控制。
①  正确
②  错误
【判断题】 从技术上来看网络入侵是网络攻击的一种。
①  正确
②  错误
【单选题】 以下常见网络攻击类型错误的是( )。
①  欺骗类攻击
②  病毒类攻击
③  漏洞类攻击
④  木马类攻击
【单选题】 网络攻击的基本步骤顺序是( )。
①  信息探测、用户访问、窃取破坏、中继攻击、清除痕迹
②  信息探测、用户访问、中继攻击、窃取破坏、清除痕迹
③  信息探测、窃取破坏、中继攻击、清除痕迹、用户访问
④  用户访问、信息探测、窃取破坏、中继攻击、清除痕迹
【单选题】 为了防止木马程序,以下操作不正确的是(  )。
①  不要下载、执行未知程序
②  定期检查开放端口
③  电脑不要开机
④  安装反木马软件
【单选题】 Web欺骗是第一步是使受害主机得到一个假的( )。
①  IP地址
②  MAC地址
③  端口号
④  网址
【判断题】 口令攻击分为在线攻击和离线攻击两类。
①  正确
②  错误
【判断题】 在网络攻击的用户访问中,既可以针对普通用户攻击也可以针对超级用户攻击。
①  正确
②  错误
【判断题】 阻塞类攻击的目的主要是使个人PC崩溃,从而无法继续工作。
①  正确
②  错误