首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
admin
2018-03-27
38
问题
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a consensual hallucination experienced daily by billions of legitimate operators" and "a graphic representation of data abstracted from the banks of every computer in the human system."
The myriad connections forged by these computing devices have brought tremendous benefits to everyone who uses the web to tap into humanity’s collective store of knowledge every day. But data breaches are becoming ever bigger and more common. Last year over 800m records were lost.
The potential damage, though, extends well beyond such commercial incursions. America’s president, Barack Obama, said in a White House press release earlier this year that cyber-threats "pose one of the gravest national-security dangers" the country is facing.
Securing cyberspace is becoming harder. Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly. A recent estimate by the Centre for Strategic and International Studies (CEIS), puts the annual global cost of digital crime and intellectual-property theft at $445 billion—a sum roughly equivalent to the GDP of a smallish rich European country such as Austria.
There is also the risk of cyber-sabotage. Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids and communications networks. Such attacks are hard to pull off, but not impossible.
The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets. One is to ensure that organizations get the basics of cyber-security right. There is also a need to provide incentives to improve cyber-security, be they carrots or sticks.
Cyberspace is about to undergo another massive change. Over the next few years billions of new devices, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the web and make them more useful.
But unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked. Plenty of people are eager to take advantage of any weaknesses they may spot. Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders. It has grown up with a vengeance.
William Gibson is mentioned to______.
选项
A、tell readers the origin of website
B、demonstrate the earliest use of the Internet
C、introduce the tremendous benefits to everyone
D、show the prescient in his literally creation
答案
D
解析
由题干关键词定位到文章第一、二段。第一段第二句是吉布森先生对网络空间的描述。第二段提到计算机给人们带来了巨大的好处。由此可知,科幻小说家对网络空间的形容和现实中的情况相符,小说的内容变成了现实。故D项“展现他作品中的先见之明” 符合题意。A项“告诉读者网站的起源”、B项“演示互联网最初的用途”和C项“介绍网络空间的巨大好处”均不是本文作者提到威廉.吉布森的目的。故选D。
转载请注明原文地址:https://kaotiyun.com/show/8fBZ777K
0
考研英语一
相关试题推荐
Ah,thenaivetyoftheoldergeneration.Nearly500eminentastronomers,biologists,chemists,physicistsandearthscientistsh
Familiarasitmayseem,gravityremainsamysterytomodernphysics.Despiteseveraldecadesoftrying,scientistshavefailed
Don’ttalk:yourcellphonemaybeeavesdropping.Thankstorecentdevelopmentsin"spyphone"software,ado-it-yourselfspook
Theclean-energybusinessisturningintothenextbiginvestmentboom,inwhichrisksarelightlyignored.Untilrecently,reca
Whatmakesagreathighschool?Americansthinkalotofthingsdo,fromoutstandingacademicsorasupportiveenvironmentfors
"Ah,yes,divorce",RobinWilliamsoncemused,"fromtheLatinwordmeaningtoripoutaman’sgenitalsthroughhiswallet".The
"Ah,yes,divorce",RobinWilliamsoncemused,"fromtheLatinwordmeaningtoripoutaman’sgenitalsthroughhiswallet".The
【F1】Americansnolongerexpectpublicfigures,whetherinspeechorinwriting,tocommandtheEnglishlanguagewithskillandg
Americanstodaydon’tplaceaveryhighvalueonintellect.Ourheroesareathletes,entertainers,andentrepreneurs,notschola
Stratford-on-Avon,asweallknow,hasonlyoneindustry—WilliamShakespeare—buttherearetwodistinctlyseparateandincreasingl
随机试题
A.乙酰胆碱B.P物质C.谷氨酸D.甘氨酸E.γ-氨基丁酸运动神经元轴突侧支至脊髓闰绍细胞处释放的递质是()。
CO2气体保护焊是焊接铝及铝合金较完善的焊接方法。()
A、急诊处方B、慢性疾病处方C、精神药品处方D、麻醉药品处方E、一般药品处方3日内有效的是
某患者正在行氧气疗法,其流量表指示流量为4L/min,该患者的吸入氧浓度是
理财师需要告知客户的理财服务信息不包括()。
某电子企业2017年4月签订以下合同:(1)与某工厂签订加工承揽合同,受托加工一批专用电子部件。合同规定,工厂(委托方)提供价值70万元的原材料,电子企业(受托方)提供价值15万元的辅助材料,另收加工费20万元。(2)与铁路部门签订运输保管合同,所载运
在肾小球滤过中阻碍带电荷的蛋白质通过滤过膜最主要的结构是()。
ABL基因位于九号染色体上,若发生图1所示的现象,会导致白血病。ABL基因如果发生基因突变又会导致某种单基因遗传病(相关基因用D,D表示),其临床表现为先天性心脏功能障碍或骨骼发育异常等,图2表示遗传病的某家系图。为了筛查致病基因,对图2中个体进行基
评价新理念要求采用()和()相结合的方式,着重评价学生的综合语言运用能力以及在学习过程中表现出的情感、态度和价值观。
设L:则t=0对应的曲线上点处的法线为_______.
最新回复
(
0
)