首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
admin
2015-04-17
50
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust.It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory.He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems.To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters.A potential for disaster is building; A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files.A student sends out a "virus" , a secret and destructive command, over a national network.The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer.Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic.Yet neither business nor government has done enough to toughen its defenses against attack.For one thing, such defenses are expensive; for another, they may interrupt communication—the main reason for using computers in the first place.
Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?
选项
A、Deleting information in the computer’s memory.
B、Shutting down the computer whenever he wishes.
C、Entering your house to steal.
D、Spoiling a system for air traffic.
答案
C
解析
本题是细节题,给出的几个选项中有一项不是黑客攻击的情况。闯入房内偷东西显然不是真正意义上的黑客行为。此题亦可凭常识作出判断。
转载请注明原文地址:https://kaotiyun.com/show/RIUd777K
本试题收录于:
职称英语综合类B级题库职称英语分类
0
职称英语综合类B级
职称英语
相关试题推荐
ComputerandSchoolEducationTherewasatimewhenparentswhowantedaneducationalpresentfortheirchildrenwouldbuya
MaleandFemalePilotsCauseAccidentsDifferentlyMalepilotsflyinggeneralaviation(private)aircraftintheUnitedStat
HaveYouFilledUpTheForm?Ofallthingsintheworld,Imostdislikefillingupforms.Infact,Ihavea【51】horrorofit
VirtualDriverDrivinginvolvessharpeyesandkeenears,analyzingwithabrain,andcoordinationbetweenhands,feetandb
ElectromagneticEnergyWhitelightseemstobeacombinationofallcolors.Theenergythatcomesfromasourceoflightis
ComputerandSchoolEducationTherewasatimewhenparentswhowantedaneducationalpresentfortheirchildrenwouldbuya
DefendingtheTheoryofEvolutionStillSeemsNeededJudithS.Weis,abiologyprofessorwhoservesaspresidentoftheAmer
WhydoesthepresidentofSonyCorporationmentionrestaurantsinthefirstparagraph?Whatisthepresident’sviewondigital
CellPhoneLetsYourSecretsOutYourcellphoneholdssecretsaboutyou.Besidesthenamesandnumbersthatyou’veprogram
Humanfacialexpressiondifferfromthoseofanimalsinthedegreetowhichtheycanbedeliberatelycontrolledandmodified.
随机试题
关于复代理,下列说法正确的是()。
儿童患流行性腮腺炎最常见的并发症是
患者,女性,33岁。卵巢囊肿摘除术后,疼痛剧烈,医嘱“哌替啶50mg,im,prn”,此医嘱属于
(2008)当光投射到漫反射表面的照度相同时,下列哪个反射比的亮度最高?
背景:某宾馆工程,建筑面积3.0万m2,剪力墙结构,地下1层,地上10层,檐高42m,内部系统齐全,智能化程度高,均由专业分包施工。工程计划于2011年3月开工,2012年12月竣工,在验收过程中发生了如下事件:事件一:由于建设单位急于使用,而其他工作
小路今年15岁,初中毕业考上了职业中专。由于父母离异,法院将其判给了爸爸。但是爸爸很快为小路找了个继母,继母对小路并不好,不让爸爸给小路筹集学费。而小路的生母,由于一直没有一个很好的工作,也没钱供小路上学。学费问题严重困扰着小路。小路面临的心理问题主要
公安行政赔偿是指公安机关及其人民警察违法行使行政职权,侵犯公民、法人和其他组织合法权益造成损害时,由国家承担的赔偿。()
[2003年MPA真题]统计表明,美国亚利桑那州死于肺病的人的比例大于其他的州死于肺病的人的比例,因为亚利桑那州的气候更容易引起肺病。以下哪项最能反驳上述论证?
在面向对象的程序设计中,下列叙述中错误的是
刘涛是某网络安全公司的技术骨干,应某高校的邀请,他将在本周日到学校向同学们讲解与黑客技术相关的知识。假如你是刘涛的助手,请根据考生文件夹下“Word素材文件.docx”中的内容,帮他完成文档的排版工作。具体要求如下:(1)在考生文件夹下,将“Word素材
最新回复
(
0
)