首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
It isn’t expected to start nibbling away at computer data systems until the docks click over to 2000, but the millennium bug has
It isn’t expected to start nibbling away at computer data systems until the docks click over to 2000, but the millennium bug has
admin
2010-01-18
73
问题
It isn’t expected to start nibbling away at computer data systems until the docks click over to 2000, but the millennium bug has been crawling on the nerves of information technology (IT) workers around the world for some time. And when the 21st century began its one-year countdown, an alarm dock was set for people everywhere to debug their computers to survive any system failures that the new century may trigger.
"The scale of the problem can never be overestimated," said 2hang Qi, director of the IT Products Administration Department under the Ministry of Information Industries. "In China, where some 10 million computers are presently at work, there is plenty of work that urgently needs to be done.’
Official reports say that most of the country’s Y2K (Year 2000)-vulnerable sectors, like banks, securities exchanges and aviation industry as well as computer users in big cities, have already fixed their computers for the year 2000 and are now at the stage of testing the new systems. But them are sectors and regions that are lagging in their preparation.
"Whatever reasons they have, all government computer systems should be fixed by March, and tests completed by September," said Zhang.
Even if this time-frame is adhered to, it cannot guarantee the normal function of computers by the year 2000, according to experts. Although systems may be free of the millennium bug, exchanges made to eradicate the bug could themselves ta~gger untold side-effects.
"My personal understanding is that many companies do not comprehend the urgency of the situation. They think one year is still a long time," said Professor IA Mingshu from the Chinese Academy of Sciences. Ironically enough, the Year 2000 problem was caused by people’s same misunderstanding of how fast time elapses.
In the early days of computing, many programmers, assuming their programs would be redundant by 2000, conserved valuable memory space by representing years with only two digits (for example, 99 rather than 1999). The practice causes programs that perform arithmetic operations to yield incorrect results when working with years outside the range of 1900-1999.
The scope of the Year 2000 challenge spans the entire IT industry. A data mismatch can exist in any level of hardware or software from microcode to application programs, in files and databases, and might be present on any platform. Just imagine if in the first quarter of the year 2000 your company cannot process its 1999 end of-year billing or end-of-year payroll properly; your corporate credit card holders are refused most transactions because their accounts appear delinquent; your 1999 year-end profit data cannot be calculated properly; and your utility companies cut off their services due to your apparent late bin payments.
China’s official war against the millennium bug was started in 1995 with corporate actions beginning one year later at the Bank of China. "So far, all the important systems have been fixed," said Doctor Liu Shuzhong of the bank’s Year 2000 Project Office. I Au added that the bank has prepared backup facilities to guarantee the normal function of the whole system in case anything urgent happens at the mm of the century. "Our ultimate goal is to protect the interests of our customers," he said.
Alongside efforts from computer users to debug their systems, IT manufacturers have also participated in the war against the millennium bug. I-Lin Chow, manager of IBM China year 2000 Project Office, said that her company has been trying every means possible in the past few years to help its Chinese clients solve the Y2K problems.
"We have opened many training courses on how to solve the problem. We’ re also providing various forms of technical support for our clients," she said.
While most attention to solving the Y2K problem has been focused on the IT industry, some experts predict that the millennium bomb may explode in less spotlighted areas. Computers only comprises 5 percent of all machines containing Y2K-vulnerable chips. The rest are found in oil pipes, nuclear stations and other heavy industrial sectors.
"It may be in such areas that the real problem lies," said IA.
When was China’s official war against the millennium bug started?
选项
A、1995.
B、1996.
C、1997.
D、1998.
答案
B
解析
文章第九段提到“China’s official war against the millennium bug was started in 1996”,因此[B]为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/6TvO777K
0
专业英语八级
相关试题推荐
WhydoconservationistsinAustraliasupportthepolicyofkillingcats?
Whathappenedafterthecallaccordingtothepassage?
WhydoconservationistsinAustraliasupportthepolicyofkillingcats?
A、Becauseshetakesupapart-timejob.B、Becausesheworkswiththegovernment.C、Becauseshehasagovernmentgrant.D、Because
A、Individualsgoodatconversationsmayfindithardtomaketheirfirstspeechbeforealargeaudience.B、Studentstrainedfor
A、Peopleeverywherehavebadheadachesduringtimeofforcefulwinds.B、Theweatherconditionsoftheatmospheregreatlyinfluen
Mostearthquakesoccurwithintheupper15milesoftheearth’ssurface.Butearthquakescananddooccuratalldepthstoabout
Eightthousandyearsago,forestscoveredmorethan23millionsquaremiles,orabout40percentofEarth’slandsurface.Today,
Weoftenhearandreadaboutcontroversialissuesinscienceandtechnology.Forexample,willradiationfromelectronicequipm
A、Michaelhadnotmadeanymistakesinthegrammarsection.B、Michaelisthesecondtohavehadmadegrammaticalmistakes.C、Mic
随机试题
在领导活动中,常有一些领导者自己决定将所拥有的一部分权力下放给下属,或口头或书面,或临时或长期的授权方式是
大面积烧伤患者早期清创的原则是
营分证的病人,一般不出现( )。
1997年5月2日,卢某因协助外国人进入我国国境,被主管机关处以5日拘留。按照《行政处罚法》的规定,这项处罚应当由哪种规范性文件设定?
地下管线工程测量必须(),测量出起,止及相关部位的标高。
看涨期权指期权的买方具有在约定期限内(或合约到期日)按()买入一定数量基础金融工具的权利。Ⅰ.协定价格Ⅱ.敲定价格Ⅲ.行权价格Ⅳ.市场价格
一般来说,喜欢人云亦云,社会敏感性高,爱好社交的人属于()认知风格。
阅读以下文字。完成问题。科举制度的取消对中国现代化造成的困难在于,原有的形成社会精英的方式由此而发生突然的断裂。正如一些研究者指出的,曾经由科举制度给社会提供的内聚力量,在其后几十年中一直都没有恢复过来。科举制度的取消既然产生如此多的消极后果,这
函数fun的功能是:将s所指字符串中除下标为偶数,同时ASCII码值也为偶数的字符外,其余的全部删除;字符串中剩余字符所形成的新串放在t所指的数组中。例如,若s所指字符串中的内容为"ABCDEFGl23456",其中字符A的ASCII码值为奇数,因此应当
考生文件夹下存在一个数据库文件“samp2.accdb”,里面已经设计好“tTeacherl”和“tTeacher2”两个表对象及一个宏对象“mTest”。试按以下要求完成设计:创建一个窗体,命名为“fTest”。将窗体“标题”属性设为“测试窗体”;在
最新回复
(
0
)