Part A
Directions: Read the following four texts. Answer the questions below each text by choosing A, B, C or D. (40 points)
Data security used to be all about spending big bucks on firewalls to defend data at the network perimeter and on antivirus software to protect individual computers. Internet-based computing, or cloud computing, has changed all that, at the same time expanding exponentially the chances for data thieves and hackers.
The cloud creates other opportunities too. a handful of security vendors now deliver security as a service--a one-two punch of hardware and software that monitors and manages an enterprise's data security and bills customers only for the computing power they use. "For years, security was about big companies pushing technology to their customers," says Qualys CEO and founder Philippe Courtot. "Now it's about the customers pulling precisely what they need and providing them with those resources on demand. "
Qualys, a privately held company in Redwood Shores, Calif. , was among the first to embrace the service-oriented model, in 1999. Today four different modules of QualysGuard, its flagship offering, are used by more than 3500 organizations in 85 countries. The company performs more than 200 million security audits per year.
Courtot knows something about opportunity. The French entrepreneur arrived in Silicon Valley in 1987 and has built a number of companies into big-time players, including Signio, an electronic-payment start-up that was eventually sold to VeriSign in a combined deal for more than $1 billion. As CEO, he rebuilt Verity and transformed cc:Mail, a once unknown firm of 12 people, into a dominant e-mail platform. before Lotus acquired it in 1991. "Throughout my career, I've been able to recognize that for a technology to succeed, it must have a purpose," he says. "Technology itself has no value. It's what you do with it that counts. "
Under the old paradigm, according to Courtot, enterprises overspent for stand-alone security devices that became unruly and difficult to operate over the long term He says Qualys attacks the flaws in this strategy by streamlining security and tackling most of the service delivery through the cloud. "We control the infrastructure, software updates, quality assurance and just about everything in between," he says. The firm unveiled QualysGuard in 2000. After an infusion of $ 25 million from the venture firm Trident Capital and another $ 25 million from Gourtot, Qualys tweaked the service to focus mostly on vulnerability management.
Much of the company's current revenue-sales, topped $ 50 million last year--is being driving by a set of standards established by the Payment Card Industry Security Standards Council (PCISSC). "The PCI standard has been a major driver of business for all of them, especially Qualys," says Avivah Litan, a vice president and analyst at market-research firm Gartner. "When everyone has to comply, there's a lot of work to go around. "
The traditional way to ensure data security is by ______.
A.applying for cloud computing
B.installing firewalls and antivirus programs
C.decreasing the chances for hackers
D.using a handful of hardwares and softwares
第1题
A、一维物理楔形板
B、组织补偿器
C、剂量补偿器
D、独立准直器动态扫描
E、以上所有均可
第2题
适形调强放射治疗每野在各点的剂量率和照射时间,一般由治疗计划系统的哪项来实现
A、逆向优化算法
B、笔形束算法
C、点剂量计算方法
D、人工优化方法
E、以上均可
第3题
A.对靶区的定义不同
B.调强适形放疗需要使用多叶光栅
C.调强适形放疗要求对射野内各点输出剂量率能进行调整
D.调强适形放疗能使高剂量分布区与靶区三维形状适形度明显提高
E.调强适形放疗能提高多数肿瘤局部区域控制率
第5题
关于调强适形放射治疗的描述错误的是
A、要求在照射方向上,照射野的形状与病变一致
B、其靶区内及其表面的剂量处处相等
C、是21世纪初主流放疗技术
D、每个射野内诸点的剂量输出率按要求的方式进行调整
E、对器官移动度较大部位的靶区优势明显
第6题
A.靶区内的剂量处处相等
B.靶区表面的剂量处处相等
C.靶区内及表面的剂量处处相等
D.临床靶区内的剂量处处相等
E.计划靶区内的剂量处处相等
第7题
下列哪项要求在照射方向上,照射野的形状与病变一致,而且其靶区内及其表面的剂量处处相等
A、放射治疗
B、适形放射治疗
C、调强适形放射治疗
D、立体定向外科
E、立体定向放射治疗
第9题
A、射野形状必须与靶区形状一致
B、射野内诸点输出剂量率应按要求方式调整
C、高剂量区的形状应在3D方向上与靶区形状一致
D、同时满足A和B
E、使用多叶准直器的治疗
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!