首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
66
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
In the future______. ( )
选项
A、Some of the most brilliant minds in America will be working to try to stop computer hackers and spies
B、hackers will begin invading computers at banks, airlines and other businesses
C、many computer hackers will be arrested for making free telephone calls
D、some computer hackers will turn themselves in to the police
答案
A
解析
细节题。“未来将是怎样的情形?”A选项“美国一些最聪明的人将努力从事阻止电脑黑客和间谍的工作”,是正确答案。依据为文中最后一句话。B选项“黑客将开始进攻银行、机场和其他商用电脑”;C选项“许多电脑黑客将因为打免费电话被逮捕”;D选项“一些电脑黑客将向警察自首”,这三个选项文中没有提到。
转载请注明原文地址:https://kaotiyun.com/show/JPrx777K
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
(63)Learningtogetherisafruitfulsourceofrelationshipbetweenchildrenandparents.Byplayingtogether,parentslearnmor
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
微处理器的主要功能就是进行算术运算和逻辑运算。()
_______是被担保合同的从合同。
A.房间隔缺损B.室间隔缺损C.动脉导管未闭D.肥厚型心肌病E.扩张型心肌病患儿,女,5岁。胸骨左缘可闻及粗糙收缩期杂音,X线检查左、右心室肥厚,最可能的诊断
内伤咳嗽的病理因素有痰、湿、饮、火、虚等,其中主要是
任何实用性的GIS均有数据质量问题,数据的质量问题或数据的误差主要有()。
我国某以股份有限公司形式设立的银行由于资本充足率严重低下,不良资产大量增加,拆入资金比例大大超过了规定标准,存款人大量挤提银行存款,财务状况严重恶化,自身求助能力有限,终于走向倒闭。请根据我国银行监管的规定,分析并回答以下问题:
甲公司为增值税一般纳税人,2013年第四季度该公司发生的固定资产相关业务如下:(1)10月8日,甲公司购入一台需要安装的设备,取得的增值税专用发票上注明的价格为98万元,增值税税额为16.66万元,另支付安装费2万元,全部款项以银行存款支付,该设备预计可
可变长子网掩码技术的使用,可以把大的网络分成小的子网,网络202.15.0.0/16分为两个子网,第一个子网为202.15.0.0/17,则第二个子网为(213)。如果某一用户1有2000台主机,则至少应给他分配(214)个C类网络,如果分配给该用户的网络
Aftertryingtomollify(平息)itscriticsinrecentyearsbyofferingbetterhealthcarebenefitstoitsemployees,Wal-Martissub
Ifyouwanttoteachourchildrenhowtosaysorry,youmustbegoodatityourself,especiallytoyourownchildren.Buthowyo
最新回复
(
0
)