首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
60
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
The main idea of the article is______ ( )
选项
A、computer hackers only want to make free long distance phone calls
B、the government wants to hire computer hackers to spy on the Russians
C、computer hackers are a threat to private companies and government secrets
D、many companies have hired experts to protect their computers from hackers who carry viruses
答案
C
解析
主旨题。“本文的主要内容是什么?”C选项“电脑黑客对私人电脑和政府机密是威胁”,是正确答案。A选项“电脑黑客只想打免费长途电话”;B选项“政府想雇佣电脑黑客监视俄国”;D选项“许多公司雇佣专家来保护电脑,使其不受携带病毒的黑客的进攻”,三个选项都不是全文主旨。
转载请注明原文地址:https://kaotiyun.com/show/CPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
(63)Learningtogetherisafruitfulsourceofrelationshipbetweenchildrenandparents.Byplayingtogether,parentslearnmor
Whataretheauthor’stwomajorexplanationsfortherelationbetweenproximityandliking?
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
在所有决策的参与者中,林德布洛姆区分了直接决策者和______两大类。
A.氯胺酮B.氧化亚氮C.依托咪酯D.硫喷妥钠E.丙泊酚精神病患者禁用的是
发生生产安全事故后,监理单位应当采取措施防止事故扩大,保护事故现场。需要移动现场物品时,应当做出标记和书面记录,妥善保管有关证物。()
在生产、加工、处理、转运或贮存过程中出现或可能出现下列哪一项爆炸性气体混合物环境时,应进行爆炸性气体环境的电力装置设计?()
2017年2月21日8时10分许,架子班班长肖某带领架子工尹某和周某3人在14号楼南向20层悬挑脚手架进行拆除作业。肖某在东侧,尹某蹲在脚手架中间位置还没有翻动的防护架板上用扳手拆除悬挑脚手架第二排钢管与横杆扣件螺帽时,横杆松脱,尹某不慎将手压在松脱横杆上
设z=f(x,y)为由方程z3-3yz+3x=8所确定的函数,则=().
2014年1月,王某拒不配合执勤民警李某对其进行身份核查,对李某辱骂、推搡、殴打,造成李某受伤(经鉴定构成轻伤二级),佩戴的眼镜也被摔坏。王某称,事发前,执勤民警要求检查其身份证,随后其与民警发生冲突。王某承认,被民警带去警务室的过程中,她用右手打了民警的
2018年8月23日至30日期间,某区公安分局辖区内连续发生多起盗割电缆案件,侦查过程中发现犯罪嫌疑人的作案车辆8月25日晚停放在下图中的甲地,8月28日上午出现在20公里外的乙地。侦查人员将能够通行路线的监控标注在下图中。通过视频监控,未发现该时间段内嫌
A、 B、 C、 D、 B
Somethingmustbedoneaboutthefact___________________________(孩子们宁可考试作弊而不好好学习准备考试).
最新回复
(
0
)