首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
43
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
In the future______. ( )
选项
A、Some of the most brilliant minds in America will be working to try to stop computer hackers and spies
B、hackers will begin invading computers at banks, airlines and other businesses
C、many computer hackers will be arrested for making free telephone calls
D、some computer hackers will turn themselves in to the police
答案
A
解析
细节题。“未来将是怎样的情形?”A选项“美国一些最聪明的人将努力从事阻止电脑黑客和间谍的工作”,是正确答案。依据为文中最后一句话。B选项“黑客将开始进攻银行、机场和其他商用电脑”;C选项“许多电脑黑客将因为打免费电话被逮捕”;D选项“一些电脑黑客将向警察自首”,这三个选项文中没有提到。
转载请注明原文地址:https://kaotiyun.com/show/JPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
形寒肢冷,脘腹冷痛,纳呆呕恶,大便稀溏,肢体水肿,腰膝酸软,舌淡苔白滑,此证属于()(2004年第23题)
透明血栓的主要成分是
题24~27:某支架为一单向压弯格构式双肢缀条柱结构,如图2-12所示,截面无削弱;材料采用Q235-B钢,E43型焊接,手工焊接,柱肢采用HA300×200×6×10(翼缘为焰切边),缀条采用。该柱承受的荷载设计值为:轴心压力N=960kN,弯矩MX=2
根据对项目不同方案的敏感性分析,投资者应选择()的方案实施。
背景资料:某大厦工程项目,建设单位与施工单位根据《建设工程施工合同文本》签订了工程的总承包施工合同,总承包商将该大厦工程项目的装饰装修工程分包给一家具有相应资质条件的某装饰装修工程公司。该装饰装修工程公司与工程项目建设单位签订了该大厦工程项目的装饰装修
甲系某中外合资企业法定代表人,该企业在某一纳税年度中,采取销售不入账和谎称原始销售统计清单丢失的方式偷税人民币70万元,占该企业应纳税额的15%,对该行为的认定,正确的是( )
在土地增值税清算过程中,房地产开发企业发生的下列情形中,可实行核定征收的有()。
C公司拟投资建设一条生产线,现有甲、乙两种投资方案可供选择,相关资料如表1所示:该公司适用的企业所得税税率为25%。假定基准现金贴现率为8%,财务费用为零。相关货币时间价值系数表如表2所示:要求:若甲、乙两方案的净现值分别为264.40万元和2
下列关于OSI参考模型层次划分原则的描述中,错误的是()。
Ratherthanallowingthesedramaticexchangesbetweenhercharacterstodevelopfully,Ms.Normanunfortunatelytendsto______
最新回复
(
0
)