首页
登录
职称英语
It isn’t expected to start nibbling away at computer data systems until the d
It isn’t expected to start nibbling away at computer data systems until the d
游客
2025-01-10
33
管理
问题
It isn’t expected to start nibbling away at computer data systems until the docks click over to 2000, but the millennium bug has been crawling on the nerves of information technology (IT) workers around the world for some time. And when the 21st century began its one-year countdown, an alarm dock was set for people everywhere to debug their computers to survive any system failures that the new century may trigger.
"The scale of the problem can never be overestimated," said 2hang Qi, director of the IT Products Administration Department under the Ministry of Information Industries. "In China, where some 10 million computers are presently at work, there is plenty of work that urgently needs to be done.’
Official reports say that most of the country’s Y2K (Year 2000)-vulnerable sectors, like banks, securities exchanges and aviation industry as well as computer users in big cities, have already fixed their computers for the year 2000 and are now at the stage of testing the new systems. But them are sectors and regions that are lagging in their preparation.
"Whatever reasons they have, all government computer systems should be fixed by March, and tests completed by September," said Zhang.
Even if this time-frame is adhered to, it cannot guarantee the normal function of computers by the year 2000, according to experts. Although systems may be free of the millennium bug, exchanges made to eradicate the bug could themselves ta~gger untold side-effects.
"My personal understanding is that many companies do not comprehend the urgency of the situation. They think one year is still a long time," said Professor IA Mingshu from the Chinese Academy of Sciences. Ironically enough, the Year 2000 problem was caused by people’s same misunderstanding of how fast time elapses.
In the early days of computing, many programmers, assuming their programs would be redundant by 2000, conserved valuable memory space by representing years with only two digits (for example, 99 rather than 1999). The practice causes programs that perform arithmetic operations to yield incorrect results when working with years outside the range of 1900-1999.
The scope of the Year 2000 challenge spans the entire IT industry. A data mismatch can exist in any level of hardware or software from microcode to application programs, in files and databases, and might be present on any platform. Just imagine if in the first quarter of the year 2000 your company cannot process its 1999 end of-year billing or end-of-year payroll properly; your corporate credit card holders are refused most transactions because their accounts appear delinquent; your 1999 year-end profit data cannot be calculated properly; and your utility companies cut off their services due to your apparent late bin payments.
China’s official war against the millennium bug was started in 1995 with corporate actions beginning one year later at the Bank of China. "So far, all the important systems have been fixed," said Doctor Liu Shuzhong of the bank’s Year 2000 Project Office. I Au added that the bank has prepared backup facilities to guarantee the normal function of the whole system in case anything urgent happens at the mm of the century. "Our ultimate goal is to protect the interests of our customers," he said.
Alongside efforts from computer users to debug their systems, IT manufacturers have also participated in the war against the millennium bug. I-Lin Chow, manager of IBM China year 2000 Project Office, said that her company has been trying every means possible in the past few years to help its Chinese clients solve the Y2K problems.
"We have opened many training courses on how to solve the problem. We’ re also providing various forms of technical support for our clients," she said.
While most attention to solving the Y2K problem has been focused on the IT industry, some experts predict that the millennium bomb may explode in less spotlighted areas. Computers only comprises 5 percent of all machines containing Y2K-vulnerable chips. The rest are found in oil pipes, nuclear stations and other heavy industrial sectors.
"It may be in such areas that the real problem lies," said IA. [br] When was China’s official war against the millennium bug started?
选项
A、1995.
B、1996.
C、1997.
D、1998.
答案
B
解析
文章第九段提到“China’s official war against the millennium bug was started in 1996”,因此[B]为正确答案。
转载请注明原文地址:https://www.tihaiku.com/zcyy/3906213.html
相关试题推荐
Fromthefirstparagraphwecaninferthat______.[br]Whycan’tacomputertra
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Thedigitalrevolutioninconsumerelectronics,includingpersonalcomputerg
Thedigitalrevolutioninconsumerelectronics,includingpersonalcomputerg
Computerprogrammersoftenremarkthatcomputingmachines,withaperfectlac
ProblemsoftheComputerAgeComputerplaysmore
ProblemsoftheComputerAgeComputerplaysmore
ProblemsoftheComputerAgeComputerplaysmore
随机试题
ForU.S.CollegeApplicants,ExtraActivitiesAreEncouragedIf
小时候,我对无论什么花,都不懂得欣赏。尽管父亲指指点点地告诉我,这是凌霄花,这是叮咚花、这是木碧花……我除了记些名称外,最喜欢的还是桂花(osmanth
[originaltext]W:Hi.HowcanIhelpyou?M:Yeah.I’dliketorentamid-sizec
阅读以下关于嵌入式软件体系架构的叙述,在答题纸上回答问题1至问题3。 某公司承
当病史不清时,急性肾衰竭和慢性肾衰竭鉴别诊断最有价值的手段是A.血钙高低 B.
关于胎动次数,表示胎儿缺氧的是A.<10次/12h B.<15次/12
地形图数据拓扑检查是对( )的检查。A.空间数据精度 B.属性数据完整性
这个学术搜索系统以数十亿计的海量元数据为基础,利用数据仓储、资源整合、知识挖掘、
所有安徽来京打工人员,都办理了暂住证;所有办理了暂住证的人员,都获得了就业许可证
在现场施工准备阶段,专业监理工程师审查分包单位资质材料时,应查验( )。A.《
最新回复
(
0
)