首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Narrator Listen to part of a lecture in a computer science class. Now get ready to answer the questions. You may use y
Narrator Listen to part of a lecture in a computer science class. Now get ready to answer the questions. You may use y
admin
2012-01-14
49
问题
Narrator
Listen to part of a lecture in a computer science class.
Now get ready to answer the questions. You may use your notes to help you answer.
What has created opportunities for computer crimes?
Professor
All right, why don’t we get started here...how many of you own and can operate a computer? ... Two, four, six…, let’s see...nineteen; hmm, that’s quite a few of you. OK, well, we all know how popular... no, not just popular... how necessary business and family computers are becoming and how much a part of modern-day life they are now; and so today, I am going to talk about computers. But actually, I don’t intend to talk about the function and operation of computers, but about a problem that is both worrying and very dangerous: computer crime. Let’s look more closely at this modern crime.
One thing is certain: Computers and especially computer networks have created opportunities for crime that never existed before, and as a result, the police and justice departments are becoming increasingly concerned about the growing number of computer users who are gaining access to private or secret information. It’s a problem that is on the rise worldwide. Statistics are showing a trend toward more computer crimes every year.
As we all know, the information that passes through computer networks can be sensitive and dangerous if the wrong people get access to it. War Games, a 1980’s movie, illustrates this point very well. In War Games, a young, high school boy gains access to the United States’ computerized military defense system with the intention of playing a game, but ends up nearly starting a nuclear war. This theme is, of course, exaggerated... it is very unlikely that any one, much less a high school boy, could penetrate the U.S. military security system, which limits access to extremely sensitive networks within the government.
But the idea behind the movie is a disturbing one. People can and, in fact, are using their experience in operating computers to break into networks... and are causing a lot of inconveniences and, even worse, are committing crimes and exposing others to danger. The point is this: Computer crime is very real and dangerous.
Computer crime is tempting for two reasons: number one, some computer geniuses have trouble resisting the challenge. They just want to see if they can do it. And number two, computer crime sometimes has some very significant rewards.
选项
A、The increased production of computers.
B、The skillful operation of computers.
C、The increasing number of people using computers.
D、The availability of computer networks.
答案
D
解析
本题为细节题,要求考生抓住讲座的细节或事实。如考生听到“Computers and especially computer networks have created opportunities for crime that never existed before (电脑,尤其是电脑网络,为过去从未有过的电脑犯罪创造了机会)”,则可知D项为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/QVyO777K
0
托福(TOEFL)
相关试题推荐
Answerthequestionsbelow.ChooseNOMORETHANTWOWORDSfromthepassageforeachanswer.Writeyouranswersinboxes10-13on
DothefollowingstatementsagreewiththeinformationgiveninReadingPassage2?Inboxes19-23onyouranswersheet,writeTR
Answerthequestionsbelow.ChooseNOMORETHANTWOWORDSfromthepassageforeachanswer.Writeyouranswersinboxes38-40on
Lookatthefollowingnamesofpeopleororganisations(Questions33-36)andthelistofopinionsbelow.Matcheachnamewithth
HowdesertsareformedA.Adesertreferstoabarrensectionofland,mainlyinaridandsemi-aridareas,wherethereisal
Whataretheadvantagesanddisadvantagesofsendingthingsbyair?【10】
WhichthreeforeignlanguagesaretraditionallytaughtintheUSA?______aresecondarytoculturalexchangeatPotomacElementa
SECTION4Questions31-40Questions31-32Completethenotesbelow.WriteNOMORETHANTHREEWORDSforeachanswer.Reasonsf
Completethenotesbelow.UseNOMORETHANTHREEWORDSforeachanswerReasonsgivenforspeakeradoptingwind-generatin
Completethenotesbelow.WriteONEWORDONLYforeachanswer.EngineeringforsustainabledevelopmentTheGreenhou
随机试题
阿片类药物中毒的拮抗剂有()。
患者,女性,48岁。因肺癌行右上肺叶切除术。术后24小时内最常见的并发症是()
【材料1】近日记者从武汉市中心医院获悉,为推进改革,促进合理用药,中心医院今年1月开始对医生合理用药实行考核。在湖北省率先对医生合理用药实行“驾照式”管理,每人每年12分,根据医生不合理用药的严重程度,分为四档进行扣分并罚款,如果扣满12分,医生将被暂停
面向合格投资者公开发行企业债券必须满足发行人最近3个会计年度实现的平均可分配利润不少于债券1年利息的()倍。
关于耕地占用税,下列说法正确的是()。
资料一万达集团创立于1988年,形成商管、文化、地产、金融四大产业集团。2017年年末企业资产7000亿元,营业收入2273亿元,位列财富世界500强第380位,在国内外享有很高的声誉。万达商业地产股份有限公司是全球商业地产行业的龙头企业,
下列关于世界上第一台电子计算机ENIAC的叙述中,不正确的是()。
2008年5月12日发生在四川汶川的地震产生的主要原因是()。
一起盗窃案发生,经调查共有二人合伙作案。警察逮捕了甲、乙、丙、丁四名嫌疑人,罪犯必是其中二人。经询问,甲说:“丁是罪犯。”乙说:“甲是罪犯。”丙说:“我不是罪犯。”丁说:“我也不是罪犯。”经调查,四人中二人说了假话,二人说了真话。则下列哪项可能为真?(
ThemanMr.Cheneyaccidentallyshotandinjuredis
最新回复
(
0
)