首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The Internet began in the 1960s as a small network of academic and government computers primarily in volved in research for the
The Internet began in the 1960s as a small network of academic and government computers primarily in volved in research for the
admin
2010-02-17
46
问题
The Internet began in the 1960s as a small network of academic and government computers primarily in volved in research for the U.S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 million U.S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks.
"Brick and mortar"
hanks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to his home or office. Companies doing business over the Internet need sophisticated security measures to protect credit card, bank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain unauthorized access to the organization’s computer systems and data.
The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online networks
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
细节理解题。根据文章最后一段最后一句中"must control the access to ensure that…”可知作者告诫人们“必须保护网络数据不被外来使用破坏或干扰”,因此,D选项为正确答案。A、B和C选项均未在文中提到。
转载请注明原文地址:https://kaotiyun.com/show/7s9K777K
0
专业英语四级
相关试题推荐
TheAmericanmedicalschoolisnowwellalonginthesecondcenturyofitshistory.Itbegan,butformanyyearscontinuedtoe
Allpeoplehavesomeabilitytomanagetheirhealthandthehealthofthosetheycarefor.Meanwhile,withtheincreasingcomple
Thequestionofwhetherlanguagesshapethewaywethinkgobackcenturies;Charlemagneproclaimedthat"tohaveasecond【S1】
Whollyasidefromaestheticandmoralconsiderations,fashionisaneconomicabsurdity,andthereislittletobesaidinitsfa
Thegreatestrecentsocialchangeshavebeen【C1】______thelivesofwomen.Duringthe20thcenturytherehasbeenaremarkable
Ispentthenexttwoyearsinvestigatingtheveryquestions______byhim.
Childrengoingtoschoolmusthaveachanceto______excessphysicalenergy;childrenevenmorethanadultsrequireandenjoyph
Inancienttimespeoplewhowerethoughttohavetheabilityto________dreamswerelikelytobehighlyrespected.
________hehadtodealwiththecasehimself.
Icouldhelphimwiththat,butIwouldsoonerhe______itbyhimself.
随机试题
(2014年)根据反垄断法律制度的规定,反垄断执法机构调查涉嫌垄断行为时,可以采取必要的调查措施。下列各项中,属于此类措施的有()。
为预防风湿热的复发,每3~4周肌注青霉素1次,持续应用:
尿中黏多糖增高的是
运用现代医学技术,不通过两性结合,而进行高等动物(包括人)生殖的技术是
某重型钢结构工作平台,结构自重5kN/m2,分项系数1.2,由检修材料产生的活荷载20kN/m2,分项系数1.3,主梁间距5m,跨度8m,简支,该梁跨中弯矩设计值为______kN·m。
在工资核算中,会计部门需要接受()提供的人员变动资料。
已知a、b均为单位向量,它们的夹角为,则|a+b|等于()。
某电视台有A、B两种智力闯关游戏,甲、乙、丙、丁四人参加,其中甲、乙两人各自独立进行游戏A,丙、丁两人各自独立进行游戏B。已知甲、乙两人各自闯关成功的概率均为,丙、丁两人各自闯关成功的概率均为。游戏A被闯关成功的人数多于游戏B被闯关成功的人数的概率是:
【《吉尔伽美什史诗》】北京师范大学2002年世界上古史真题;南京大学2005年世界史真题
当信息从信源向信宿流动时可能会受到攻击。其中中断攻击是破坏系统资源,这是对网络【】性的攻击。
最新回复
(
0
)