首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
admin
2009-01-05
64
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shop ping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to his home or office. Companies doing business over the Internet need sophisticated security measures to protect credit card, bank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain unauthorized access to the organization’s computer systems and data.
The underlined term "brick and mortar banks" (Line 3, Para. 2) refers to ______.
选项
A、banks with dependable reputations
B、banks with competitive interest rates
C、banks with traditional walk-in services
D、banks with reliable on-line services
答案
C
解析
细节理解题。从文章第二段可知,“brick and mortar banks”是用有形建筑材料指代传统银行,用来和无形的网络银行形成对比。因此,C选项为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/QaBK777K
0
专业英语四级
相关试题推荐
IwasinnorthernKenya,whichissufferingthroughtheworstdroughttohittheHornofAfricain60years.Thetollofdepri
Todaywomenearnalmost60percentofallbachelor’sdegreesandmorethanhalfofmaster’sandPh.D.’s.Manypeoplebelieveth
Todaywomenearnalmost60percentofallbachelor’sdegreesandmorethanhalfofmaster’sandPh.D.’s.Manypeoplebelieveth
Toauniversitystudentwhoisdoomedtoenterintosocietytorealizehimself,whichismoreimportant—educationorsociallife
OfalltheextraordinaryeventsinthelifeofJohnPaulII,fewcancomparewiththe21minuteshespentinawhite-walledcell
TheIndiancoastalbelthasnotrecordedmanyTsunamisinthepast.Wavescompanyingearthquakeactivityhavebeenreportedover
IfJimDehlseneverneedstoremindhimselfwhy,at67,he’sstilltryingtosavetheworld,allhehastodoisglanceoutsid
DuringhisSaturdayweeklyradioaddress,heurgedCongress______evenifhevetostheirbudgetproposal.
Theevolutionofsexratiohasproduced,inmostplantsandanimalswithseparatesexes,approximatelyequalnumbersofmalesan
随机试题
人机系统的任何活动实质上是信息及能量的传递和交换,人在人机系统中主要有三种功能。下列功能中,不属于人机系统中人所具有的功能是()。
有关膝关节的叙述,何者为错?()
设y=f(f),t=φ(x)都可微,则dy=()。
《刑法》规定的刑罚分为主刑和附加刑两类,其适用原则有()。
审贷分离的形式不包括()。
实施部门预算支出绩效考评时,对无法直接用指标计量其效果的支出,通过专家评估、公众问卷及抽样调查方法,就各项绩效考评内容的完成情况进行打分,并根据分值考评绩效目标的完成情况,这种方法称为()。
《托儿所幼儿园卫生保健工作规范》规定托幼园所工作人员接受健康检查的频率是()
下列选项中,对我国发展的内部条件和外部环境正在发生的深刻复杂变化,判断不正确的是()。
实施企业系统规划方法(BSP)的主要目的是为了实现企业信息系统的()。
A、No,youcan’tB、Speaking.C、I’mLinda.D、Idon’twanttotellyou.B这是电话用语,如果接电话的人正是对方要找的人,应用speaking,介绍时应用thisis,故选B。
最新回复
(
0
)