首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
112
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
U. S. government computers are vulnerable to a hacker because ______. ( )
选项
A、the government always pays its telephone bills on time
B、the Russians know what’s in the U. S. computers
C、viruses attack only government computers
D、many government computers are connected by telephone lines
答案
D
解析
细节题。“美国政府的电脑容易遭受黑客攻击的原因是什么?”D选项“许多政府电脑通过电话线相连”,是正确答案。文中第三段说The government’s classified secrets…tap into。A选项“政府一直按时交纳电话费”,B选项“俄国知道美国电脑里面有什么”,C选项“病毒只攻击政府电脑”,这三个选项文中没有提到。
转载请注明原文地址:https://kaotiyun.com/show/DPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
根据所在部位及生理功能,骨骺可分为
涉外经济法律关系
关于法律原则,下列说法中错误的是哪一项?()
轴间的剪力墙设于:
在软土、沼泽地区,()的情况下,用垫隔、覆盖土工布处理会收到较好的效果。
防烟排烟系统的安装主要包括风管、阀门组件和风机等主要设备的安装检测与调试。下列关于风管的安装与检测中,错误的有()。
根据《火灾自动报警系统设计规范》的规定,消防控制室内的设备面盘至墙的距离不应小于()m。
子公司少数股东持有的权益对企业集团重要的,企业还应当在合并财务报表附注中披露下列信息()。Ⅰ.子公司少数股东的持股比例Ⅱ.当期归属于子公司少数股东的损益以及向少数股东支付的股利Ⅲ.子公司在当期期末累计的少数股东权益余额Ⅳ.子公司的主要财务信息
父母去世后,老夏把未成年的弟弟扶养成人。老夏夫妇育有一子一女,均已结婚生子、生活富裕。老夏现年事已高,丧失劳动能力。根据《老年人权益保障法》,下列人员中,对老夏有赡养或扶养义务的有其()。
根据我国宪法和有关法律的规定,下列选项中有关法规批准生效的情形哪一个是错误的?()
最新回复
(
0
)