首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
84
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
U. S. government computers are vulnerable to a hacker because ______. ( )
选项
A、the government always pays its telephone bills on time
B、the Russians know what’s in the U. S. computers
C、viruses attack only government computers
D、many government computers are connected by telephone lines
答案
D
解析
细节题。“美国政府的电脑容易遭受黑客攻击的原因是什么?”D选项“许多政府电脑通过电话线相连”,是正确答案。文中第三段说The government’s classified secrets…tap into。A选项“政府一直按时交纳电话费”,B选项“俄国知道美国电脑里面有什么”,C选项“病毒只攻击政府电脑”,这三个选项文中没有提到。
转载请注明原文地址:https://kaotiyun.com/show/DPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
(able)Recentinnovationswithcomputeraideddesign______ustoproducemagazineswhicharemorecreative,efficientandcost-e
(63)Learningtogetherisafruitfulsourceofrelationshipbetweenchildrenandparents.Byplayingtogether,parentslearnmor
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
随机试题
女孩,7岁。因“皮肤苍黄6年,发现脾肿大2个月”入院。血常规示:Hb:78g/L,RBC2.8×1012/L,Ret12%,WBC3.8×109/L,N55%,L45%,PLT100×109/L。经查确诊为“遗传性球形红细胞增多症”。应采取下列
患者,男性,72岁。8年前开始经常咳嗽、咳痰,近1年来症状加重,今晨排便时,突然出现气急、呼吸困难。查体:呼吸30次/min,口唇发绀,气管轻度右偏,桶状胸,左肺叩呈鼓音,呼吸音消失。急诊首先应进行下列哪项检查
炎症增生性病变对机体的主要作用是
案例B石化分公司双苯厂硝基苯精馏塔发生爆炸,造成8人死亡,60人受伤,直接经济损失6908万元,并引发江水污染事件。国务院事故及事件调查组认定,D石油B石化分公司双苯厂爆炸事故和江水污染事件是一起特大生产安全责任事故和特别重大水污染责任事件。
代理客户办理专用证券账户,应当由()向证券登记结算机构申请。
亚当.斯密关于公司信贷的理论是()。
我国首条开通的高寒地区高速铁路是()。
下列关于二叉树的叙述中正确的是()。Ⅰ.对于任何一棵二叉树,叶子结点数都是度为2的结点数加1Ⅱ.二叉树的左右子树不可以任意地交换Ⅲ.二叉树只适合使用链式结构存储,不可能用顺序结构存储Ⅳ.结点按层序编号的二叉树,第i个结点的左孩子(假设存在)
Humble______itmaybe,there’snoplacelikehome,______hemaygo.
A、Cousins.B、Auntandnephew.C、Nieceanduncle.D、Aclientandasecretary.AW:IsAuntMargaretin?Ihavegotsomethingimpor
最新回复
(
0
)