【单选题】
童年文学应注重想象和认知,以开阔儿童认知世界的视野,强调以___为主。
A. 正面教育
B. 逐渐成熟
C. 智力变化
D. 心理发展
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
少年期是儿童和成人的___,生理发育逐渐成熟并走向性成熟,心理方面如智力、性格变化等也有很大的发展。
A. 衔接期
B. 过渡期
C. 变化期
D. 转变期
【单选题】
少年文学其文学审美接受已从自主性逐渐走向___。
A. 浪漫性
B. 典型性
C. 批判性
D. 创造性
【单选题】
幼儿文学除了具有一般文学特征外,还具有独特的___
A. 美学特征
B. 感性特征
C. 创新特征
D. 稚拙特征
【单选题】
幼儿文学中的人物多数是简单、固定、平面的___人物。
【单选题】
幼儿文学表现的主题大多可以看成是不同形式___的表达。
【单选题】
幼儿文学是充满诗意的___。
A. 现实文学
B. 浪漫文学
C. 讽刺文学
D. 励志文学
【单选题】
幼儿文学是深入浅出的___。
A. 现实文学
B. 浪漫文学
C. 讽刺文学
D. 口语文学
【单选题】
在游戏中,幼儿所表现出的丰富的想象力,独特的思维逻辑、创造性语言表达等,都是其独特___的体现
A. 幻想力
B. 破坏力
C. 想象力
D. 创造力
【单选题】
幼儿欣赏文学作品的过程就是___边欣赏边获得美的享受,既陶冶了情操,又培养了审美能力。
A. 欣赏过程
B. 创造过程
C. 审美过程
D. 感受过程
【单选题】
幼儿文学作家要充分考虑幼儿的审美特点,创造出符合他们___的文学作品。
A. 审美情趣
B. 感受情绪
C. 幻想特点
D. 自由无拘
【单选题】
泛灵观念是指把万事万物___自己的世界,认为它们有生命有意识。
A. 相反于
B. 区别于
C. 等同于
D. 接近于
【单选题】
儿歌是一种适合幼儿听赏的诵唱的___,是幼儿最早接触的文学样式。
【单选题】
幼儿诗是契合幼儿的___且适合幼儿阅读欣赏,并被他们所乐于接受的诗歌。
A. 跳跃创新
B. 思维创新
C. 接受能力
D. 心理特点
【单选题】
诗是抒情的艺术,___是诗的突出特征。
A. 抒情述志
B. 述志抒怀
C. 咏物言志
D. 意境深邃
【单选题】
幼儿诗普遍具有___的音韵和鲜明的节奏,多用叠词叠韵,构成悦耳动听,朗朗上口的音韵。
【单选题】
童话的___,即具有为儿童编撰的、幻想的、符合儿童的心理和欣赏能力的特征。
A. 概念
B. 基本特征
C. 定义
D. 判断
【单选题】
___是一种适合儿童欣赏和接受的、具有特殊幻想性质的叙事文学体式。
【单选题】
___由劳动人民创作,经世代口耳相传,带有明显的民族或地方特色。
A. 民间童话
B. 创作童话
C. 文学童话
D. 知识童话
【单选题】
___的主人翁一般是普通人,但这些普通人却有着离奇有趣的经历和遭遇。
A. 超人体童话
B. 拟人体童话
C. 常人体童话
D. 凡人体童话
【单选题】
___又称科学童话,是以童话的形式向儿童传授科学知识的童话。
A. 民间童话
B. 故事童话
C. 文学童话
D. 知识童话
【单选题】
___是童话的基本特征,是童话的手段,也是童话目的。
【单选题】
幻想并不等同于胡编乱造,它是现实生活在人们头脑中的一种___。
A. 特殊反映
B. 情感体验
C. 视觉享受
D. 意境转换
【单选题】
童话的主要表现手法___是借助某一具体事物的形象,表现抽象的概念、思想和情感等。
【单选题】
童话的叙述方式___在童话中一些相同或者相似的情节反复出现、层层递进,最后到达高潮。
A. 梦幻式
B. 反复式
C. 对照式
D. 误会式
【单选题】
纵观安徒生的童话创作历程___他创作的童话充满着绚丽的幻想和乐观主义精神,很好地将现实主义和浪漫主义结合起来。
【单选题】
___中国现代作家、教育家、文学出版家和社会活动家,一生致力于中国教育事业的研究和文学的创作,有“优秀的语言艺术家”之称。
A. 张天翼
B. 郑渊洁
C. 叶圣陶
D. 郑振铎
【单选题】
幼儿教师在改编童话时主要注意的事项有篇幅改短、___、语言趋于幼儿化。
A. 人物减少
B. 寓意变浅
C. 语言简洁
D. 主题变浅
【单选题】
___是指符合幼儿理解能力、适合幼儿阅读欣赏的故事。
A. 幼儿戏剧
B. 幼儿童话
C. 幼儿儿歌
D. 幼儿故事
【单选题】
狭义的幼儿故事特质取材于___、内容侧重写实且适合幼儿阅读欣赏的故事。
A. 现实生活
B. 幼儿生活
C. 家庭生活
D. 日常生活
【单选题】
幼儿故事的特征有现实性、___、讲述性。
A. 幼儿性
B. 故事性
C. 虚幻性
D. 真实性
【单选题】
从幼儿故事的创作过程来看,可以分类为___、改编故事、创作故事
A. 民间故事
B. 图画故事
C. 文字故事
D. 经典故事
【单选题】
从幼儿故事的内容来看,可以分类为___、历史故事、动物故事、民间故事、知识故事等。
A. 生活故事
B. 图画故事
C. 文字故事
D. 经典故事
【单选题】
幼儿教师在日常的教学活动中所选用的幼儿故事的内容主要有三种:一是真人真事,二是___,三是改编的故事
A. 创作的故事
B. 幻想的故事
C. 虚构的故事
D. 经典的故事
【单选题】
___是以幼儿为主要接受对象的一种特殊的文学样式,用图画与 文字共同叙述一个完整的故事。它的基本特点是以图画为主、文字为辅,或者全部用图画来表现故事。
A. 幼儿图画书
B. 幼儿故事书
C. 民间故事书
D. 幼儿童话书
【单选题】
图书<蚂蚁和西瓜>属于___。
A. 系列图画书
B. 多幅图画书
C. 单色图画书
D. 彩色图画书
【单选题】
图书<我想去看海>属于___。
A. 系列图画书
B. 多幅图画书
C. 单色图画书
D. 彩色图画书
【单选题】
图书<好饿的小白熊>属于___。
A. 系列图画书
B. 多幅图画书
C. 单色图画书
D. 彩色图画书
【单选题】
幼儿图画书的分类按故事形式分有文图画书和___。
A. 有文图画书
B. 单幅图画书
C. 系列图画书
D. 无文图画书
推荐试题
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site