皮皮学,免费搜题
登录
logo - 刷刷题
搜题
【简答题】
阅读理解 Imagine you're at a party full of strangers. You're nervous. Who are these people? How do you start a conversation? Fortunately, you've got a thing that sends out energy at tiny chips in everyone's name tag (标签). The chips send back name, job, hobbies, and the time available for meeting-whatever. Making new friends becomes simple. This hasn't quite happened in real life. But the world is already experiencing a revolution using RFID technology. An RFID tag with a tiny chip can be fixed in a product, under your pet's skin, even under your own skin. Passive RFID tags have no energy source - batteries because they do not need it. The energy comes from the reader, a scanning device (装置), that sends out energy (for example, radio waves) that starts up the tag immediately. Such a tag carries information specific to that object, and the data can be updated. Already, RFID technology is used for recognizing each car or truck on the road and it might appear in your passport. Doctors can put a tiny chip under the skin that will help locate and obtain a patient's medical records. At a nightclub in Paris or in New York the same chip gets you into the VIP (very important person) section and pays for the bill with the wave of an arm. Take a step back: 10 or 12 years ago, you would have heard about the coming age of computing. One example always seemed to surface: Your refrigerator would know when you needed to buy more milk. The concept was that computer chips could be put everywhere and send information in a smart network that would make ordinary life simpler. RFID tags are a small part of this phenomenon. 'The world is going to be a loosely coupled set of individual small devices, connected wirelessly,'predicts Dr. J. Reich. Human right supporters are nervous about the possibilities of such technology. It goes too far tracking school kids through RFID tags, they say. We imagine a world in which a beer company could find out not only when you bought a beer but also when you drank it. And how many beers. Accompanied by how many biscuits. When Marconi invented radio, he thought it would be used for ship-to-shore communication, not for pop music. Who knows how RFID and related technologies will be used in the future. Here's a wild guess: Not for buying milk. 1. We know from the passage that with the help of RFID tags, people _______. A. will have no trouble getting data about others B. will have more energy for conversation C. will have more time to make friends D. will not feel shy at parties any longer 2. Passive RFID tags chiefly consist of _______. A. scanning devices B. radio waves C. batteries D. chips 3. Why are some people worried about RFID technology? A. Because children will be tracked by strangers. B. Because market competition will become more fierce. C. Because their private lives will be greatly affected. D. Because customers will be forced to buy more products. 4. The last paragraph implies that RFID technology _______. A. will not be used for such matters as buying milk B. will be widely used, including for buying milk C. will probably not be used for pop music D. will be limited to communication uses
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
参考答案:
举一反三
【简答题】读中国东经89°附近 地势剖面图,完成下列要求: (1)填写图中字母表示的地形区名称: A_______;B_______;C_______;D_______。 (2)图中相对高度最大可达 _______ 米。 (3)图中B地所属的干湿区为 _______ ;当地最典型的农业特色是_______。 (4)该地的 是我国到目前为止加入的15个联合国“人与生物圈计划”中的自然保护区之一。 (5)据考证...
【简答题】读我国能源调运图(右下图),回答26~28题。 小题1:图中①②③三条运输路线输送的主要能源分别是 A.火电、天然气和水电 B.石油、天然气和煤炭 C.天然气、石油和水电 D.煤炭、石油和天然气 小题2:“西电东送”工程的主要目的是 A.保护西部地区的生态环境 B.治理东部地区的大气污染 C.解决中东部地区的能源短缺问题 D.增加西部地区的河流航运能力 小题3:进行资源跨区域调配的主要原因是 ①自...
【单选题】下列物质中不能与溴水发生反应的是(    ) ①苯②苯酚③亚硫酸④NaOH溶液⑤AgNO 3 溶液⑥裂解汽油⑦己烷⑧镁粉
A.
①③⑥
B.
①⑦
C.
①⑥⑦⑧
D.
①②⑤⑦
【多选题】下面有关防止计算机犯罪的说法正确的是
A.
加强教育,提高计算机安全意识,预防计算机犯罪。一方面,社会和计算机应用部门要提高对计算机安全和计算机犯罪的认识,从而加强管理,减少犯罪分子的可乘之机;另一方面,从一些计算机犯罪的案例中看到,不少人,特别是青少年常常出于好奇和逞强而在无意中触犯了法律。应对这部分人进行计算机犯罪教育,提高其对行为后果的认识,预防犯罪的发生
B.
健全惩治计算机犯罪的法律体系。健全的法律体系一方面使处罚计算机犯罪有法可依,另一方面能够对各种计算机犯罪分子起到一定的威慑作用
C.
发展先进的计算机安全技术,保障信息安全。比如使用防火墙、身份认证、数据加密、数字签名和安全监控技术、防范电磁辐射泄密等
D.
实施严格的安全管理。计算机应用部门要建立适当的信息安全管理办法,确立计算机安全使用规则,明确用户和管理人员职责;加强部门内部管理,建立审计和跟踪体系
【单选题】影响药物效应的生物因素包括
A.
药物理化性质
B.
年龄
C.
药物的化学结构
D.
药物药理作用
E.
药物的剂型
【单选题】PH公司是一家共有45人的系统集成公司。为加强知识产权保护等安全管理,PH公司对公司 内局域网采取了以下安全解决方案:安装防火墙限制对Intemet的访问;安装过滤软件禁止邮件被 发送到Internet;对堆叠在一起的两台24口千兆交换机的每个端口进行“端I]+MAC地址+IP地址” 绑定,限制无关计算机访问内部局域网;每台计算机只安装DVDROM并在BIOS中禁用USB口 以防止公司重要文档被拷...
A.
防火墙不能阻止信息传送
B.
员工可建立FTP服务器外传文栏
C.
没有设置进入网络的密码系统
D.
没有在公司内部部署CA服务器
【简答题】公元494年,高度汉化的鲜卑拓跋氏建立北魏政权,在魏孝文帝的带领下()。
【单选题】影响药物效应的生物因素包括
A.
药物理化性质
B.
种族
C.
药物的化学结构
D.
药物药理作用
E.
药物的剂型
【多选题】下列各项中,关于账证核对的说法正确的是()
A.
账证核对是对会计账簿记录与原始凭证,记账凭证的各项内容进行核对
B.
通常在日常编制凭证和记账过程中进行
C.
是追查会计记录正确与否的最终途径
D.
如果账账不符,可以将账簿记录有关会计凭证进行核对
【多选题】下列各项中,关于账证核对的说法正确的是( )。
A.
如果账账不符,可以将账簿记录与有关会计凭证进行核对
B.
账证核对是对会计账簿记录与原始凭证、记账凭证的各项内容进行核对
C.
是追查会计记录正确与否的最终途径
D.
通常在日常编制凭证和记账过程中进行
相关题目:
参考解析:
知识点:
题目纠错 0
发布
创建自己的小题库 - 刷刷题