首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
admin
2016-07-17
101
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust.It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory.He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems.To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters.A potential for disaster is building; A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files.A student sends out a "virus" , a secret and destructive command, over a national network.The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer.Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic.Yet neither business nor government has done enough to toughen its defenses against attack.For one thing, such defenses are expensive; for another, they may interrupt communication—the main reason for using computers in the first place.
The writer mentions "a thief" in the second paragraph______.
选项
A、to show that a hacker is more dangerous than a thief
B、to tell people that thieves like to steal computers nowadays
C、to demand that a protective computer system should be set up against thieves
D、to demonstrate that hackers and thieves are the same people
答案
A
解析
本题问作者为什么在第二段提到“a thief”(小偷)?大家知道,闯入别人家偷东西的人被称为小偷,文章第二段第三句提到,黑客比小偷还厉害,还危险,故选A。
转载请注明原文地址:https://kaotiyun.com/show/5nUd777K
本试题收录于:
职称英语综合类B级题库职称英语分类
0
职称英语综合类B级
职称英语
相关试题推荐
TheWorld’sLongestBridgeRumorhasitthatalegendarysix-headedmonsterlurksinthedeepwatersoftheTyrhenianSeabe
BlackHolesTriggerStarstoSelf-DestructScientistshavelongunderstoodthatsupermassiveblackholesweighingmillions
DefendingtheTheoryofEvolutionStillSeemsNeededJudithS.Weis,abiologyprofessorwhoservesaspresidentoftheAmer
TheNewsIndustryinUSWhydosomanyAmericansdistrustwhattheyreadintheirnewspapers?TheAmericanSocietyofNewspa
HowtoPrepareforanInterviewBeinginterviewedisasituationthatnearlyeveryonefacesatsometimeinlife,whetherfo
TheGreatNewspaperWarUpuntilabout100yearsago,newspapersintheUnitedStatesappealedonlytothemostseriousread
EarlyUnitedStatesReinterpretedbyBernardBailynBernardBailynhasrecentlyreinterpretedtheearlyhistoryoftheUnite
OlderVolcanicEruptionsVolcanoesweremoredestructiveinancienthistory,notbecausetheywerebigger,butbecausetheca
Thebricklayerisworkingonthehousetoday.
SilencePleaseIfthereisonegroupofworkersacrosstheWesternworldwhowillbegladthatChristmasisover,thatgroup
随机试题
Despitehelpingtorecordevents,photoscoulddamageourmemories.Researchersfoundpeoplewhotakepictureshave【C1】________r
患者男,47岁。近期出现双侧指间关节疼痛较重,伴发关节肿胀、畸形,呈“鹅颈样”。对该患者的处理方法为
伴有糖尿病的水肿患者不宜选用哪一种利尿药
SMA混合料所用的沥青结合料要求必须是改性沥青。()
方程y"=1+y’2的通解为( )。
背景资料:某市进行市政工程招标,投标人范围限定为本省大型国有企业。甲公司为了中标,联合当地一家施工企业进行投标,并成立了两个投标文件编制小组,一个小组负责商务标编制,一个小组负责技术标编制。在投标过程中,由于时间紧张,商务标编写组重点对造价影响较大的原
洞内导线应根据洞口投点向洞内作引申测量,洞口投点应纳入()内。
食堂在制作白菜炒肉丝,大米饭。实际该份菜肴用白菜15kg、猪肉2kg、色拉油1kg,炒熟后总重量为22kg。现有一份200g米饭(生熟比0.5),一份白菜炒肉丝(熟重400g),请计算和分析该份餐各种食品的生食进食量。
Myprettygirlfriendhadafailedmarriageinthepast.Afterdivorce,herparentsshedthedeepestprotectionandcaretoherb
在资本主义生产过程中,资本采取的形态是()
最新回复
(
0
)