Chomsky defines “competence” as the ideal user’s k()of the rules of his language.

题目

Chomsky defines “competence” as the ideal user’s k()of the rules of his language.


相似考题
参考答案和解析
正确答案:knowledge
更多“Chomsky defines “competence” as the ideal user’s k()of the rules of his language.”相关问题
  • 第1题:

    What is a function of a user role?()

    A. It defines the IPsec parameters for the role.

    B. It assigns access to resources.

    C. It associates the user with a RADIUS server.

    D. It defines the types of authentication methods available to the user


    参考答案:A

  • 第2题:

    According to Chomsky,__________ refers to the actual realization of user′s knowledge of therules of his language in utterances.


    A.competence

    B.performance

    C.parole

    D.langue

    答案:B
    解析:
    考查语言学中的一些重要区别。A和B选项是乔姆斯基提出的语言能力(competence)和语言运用(performance),语言能力指的是一个理想语言使用者关于语言规则的语言知识.语言运用指的是在语言交际中关于语言规则的语言知识的实际使用;C和D选项是语言学之父索绪尔提出的言语(parole)和语言(langue),言语指的是语言在实际使用中的实现,语言指的是一个言语集团的所有成员共享的抽象语言系统.语言是抽象的,而言语是具体的。题干表达的是对语言规则的语言知识的实际使用.因此正确答案为B。

  • 第3题:

    Chomsky refers to the child’s innate endowment as(),a set of principles which are common to all languages.
    universal grammar

  • 第4题:

    What is a function of a user role?()

    • A、It defines the IPsec parameters for the role.
    • B、It assigns access to resources.
    • C、It associates the user with a RADIUS server.
    • D、It defines the types of authentication methods available to the user

    正确答案:A

  • 第5题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第6题:

    You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()

    • A、Add Julia’s user account to the local Power Users group.
    • B、Add Julia’s user account to the local Administrators group.
    • C、Allow Julia’s user account Write permissions to C:///Data.
    • D、Allow Julia’s user account Full Control permission to C:///Data.

    正确答案:C

  • 第7题:

    You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)

    • A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.
    • B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.
    • C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.
    • D、Use Computer Management to reset the password for the local Administrator account.

    正确答案:B,C

  • 第8题:

    You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()

    • A、Instruct the user to move the documents to the Shared Folders folder.
    • B、Add the user's user account to the local Power Users group.
    • C、Add the user's user account to the Network Configuration Operators group.
    • D、Add the user's user account to the local Adminstrators group.

    正确答案:B

  • 第9题:

    填空题
    Chomsky defines “competence” as the ideal user’s k()of the rules of his language.

    正确答案: knowledge
    解析: 暂无解析

  • 第10题:

    单选题
    According to Chomsky, which is the ideal user’s internalized knowledge of his language?
    A

    competence

    B

    parole

    C

    performance

    D

    langue


    正确答案: A
    解析:
    乔姆斯基认为说话者的头脑中的语言知识系统被称为语言能力(language competence),因此答案选A。

  • 第11题:

    单选题
    有以下函数: #include  #define S(x)(x)*x*2 main() {  int k=5,j=2;  printf(%d,,S(k+j));  printf(%d,S(k-j)); } 程序运行后的输出结果是(  )。
    A

    98,18

    B

    39,11

    C

    39,18

    D

    98,11


    正确答案: D
    解析:
    根根据该宏的定义,S(k+j) = (k+j)*k+j*2 = 39,S(k-j) = (k-j)*k-j*2 = 11,答案选择B选项。

  • 第12题:

    单选题
    An illocutionary act is identical with_______.
    A

    sentence meaning

    B

    the speaker's intention

    C

    language understanding

    D

    the speaker's competence


    正确答案: C
    解析:

  • 第13题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    A. LDAP

    B. S/Key

    C. TACACS+

    D. RADIUS

    E. SiteMinder


    参考答案:A, D, E

  • 第14题:

    The distinction between competence and performance was made by( ).

    A.Halliday
    B.Saussure
    C.Bloomfield
    D.Chomsky

    答案:D
    解析:
    语言学家及其代表理论。Competence and Performance(语言能力及语言运用)是Noam Chomsky在其代表作Aspects of the Theory of Syntax中提出的。

  • 第15题:

    What is the difference between Skinner’s behaviorism and Chomsky’s mentalism?
    Where behaviorism ignored the contribution of the child itself in the learning process, mentalism has practically denied that linguistic input and environment play a role in this process, and has generally paid very scant attention to the actual course language development takes.

  • 第16题:

    Chomsky defines “competence” as the ideal user’s k()of the rules of his language.


    正确答案:knowledge

  • 第17题:

    Which backup option defines a user-defined name for a backup? ()

    • A、FORMAT
    • B、NAME
    • C、TAG
    • D、FORMAT U%

    正确答案:C

  • 第18题:

    You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()

    • A、Place the phone in Bluetooth discovery mode.
    • B、Place the user’s computer in Bluetooth discovery mode.
    • C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
    • D、Install mobile phone synchronization software on the user’s computer.

    正确答案:B

  • 第19题:

    You are the administrator of Company.com’s network.  Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers.  Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder.   When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders.   You want to enable the user to save files in his home folder.  What should you do?()

    • A、 Use Windows Backup to archive and remove old files on the server. 
    • B、 Increase the server’s disk quota entry for the user to accommodate the additional files. 
    • C、 Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. 
    • D、 Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.

    正确答案:B

  • 第20题:

    单选题
    According to Chomsky, _____refers to the actual realization of user's knowledge of the rules of his language in utterances.
    A

    competence

    B

    performance

    C

    parole

    D

    langue


    正确答案: D
    解析:

  • 第21题:

    单选题
    What is a function of a user role?()
    A

    It defines the IPsec parameters for the role.

    B

    It assigns access to resources.

    C

    It associates the user with a RADIUS server.

    D

    It defines the types of authentication methods available to the user


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An illocutionary act is identical with
    A

    sentence meaning

    B

    the speaker's intention

    C

    language understanding

    D

    the speaker's competence


    正确答案: A
    解析:

  • 第23题:

    单选题
    若有以下程序 #include  #define S(x)x*x #define T(x)S(x)*S(x) main() {  int k=5,j=2;  printf(%d,%d,S(k+j),T(k+j)); } 则程序的输出结果是(  )。
    A

    17,37

    B

    49,2401

    C

    17,289

    D

    49,289


    正确答案: C
    解析:
    编译系统处理带参数的宏名时,按程序行中指定的字符串,括号内的内容,从左到右进行处理,若遇到形参则以实参代替,非形参字符原样保留,就形成了替换后的内容,这期间没有任何计算。S(k+j)展开后是5+2*5+2 = 17,T(k+j)展开后是5+2*5+2*5+2*5+2 = 37。答案选择A选项。

  • 第24题:

    问答题
    What is the difference between Skinner’s behaviorism and Chomsky’s mentalism?

    正确答案: Where behaviorism ignored the contribution of the child itself in the learning process, mentalism has practically denied that linguistic input and environment play a role in this process, and has generally paid very scant attention to the actual course language development takes.
    解析: 暂无解析