首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
74
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
U. S. government computers are vulnerable to a hacker because ______. ( )
选项
A、the government always pays its telephone bills on time
B、the Russians know what’s in the U. S. computers
C、viruses attack only government computers
D、many government computers are connected by telephone lines
答案
D
解析
细节题。“美国政府的电脑容易遭受黑客攻击的原因是什么?”D选项“许多政府电脑通过电话线相连”,是正确答案。文中第三段说The government’s classified secrets…tap into。A选项“政府一直按时交纳电话费”,B选项“俄国知道美国电脑里面有什么”,C选项“病毒只攻击政府电脑”,这三个选项文中没有提到。
转载请注明原文地址:https://kaotiyun.com/show/DPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
(able)Recentinnovationswithcomputeraideddesign______ustoproducemagazineswhicharemorecreative,efficientandcost-e
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
液压基本回路是由一些_______组成并能完成某种_______的典型_______。常用的液压基本回路按不同作用可分为_______、_______、_______和_______。
下列哪项不是高血压心脏病的表现()。
对UV法进行准确度考查时,回收率一般为
患者,女,32岁。结婚三年没有怀孕,月经时而提前时而延后,经量不定时多时少,月经来潮前心情易躁易怒,乳房胀痛,精神萎靡不振,经常叹息,舌暗红,脉弦细,治法为()
甲诉乙人身侵权一案,在市中级人民法院作出二审判决后,判决乙赔偿损失10万元,判决生效后,乙故意拖延。甲申请强制执行,执行过程中,两者达成和解协议,由乙一次性付给甲8万元,并履行完毕,判决生效半年后,乙发现一主要证据可证明损失是由甲自身的原因造成,遂向法院申
【背景资料】某大型工程,由于技术难度大,对施工单位的施工设备和同类工程施工经验要求比较高,而且对工期的要求比较紧迫。业主在对有关单位和在建工程考察的基础上,邀请了3家国有一级施工企业投标,通过正规的开标评标后,择优选择了其中一家作为中标单位,并与
一条计算机指令中规定其执行功能的部分称为()。
物流共同化从大的方面来划分,可以分为以同产业间共同配送和异产业问共同配送。
简述徇私枉法罪的概念和构成要件。
Mostpeoplecanidentifytheirtoppriorityatwork,Generally,itwillbethepartofthejobthatismostproductivefortheir
最新回复
(
0
)