首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
admin
2010-05-26
32
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil- lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to their home or office. Companies doing business over the
Internet need sophisticated security measures to protect credit card, hank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain un-authorized access to the organization’s computer systems and data.
Which commercial usage of the Internet does the author NOT refer to?
选项
A、Buying airline tickets.
B、Trading stocks.
C、Applying for a credit card.
D、Opening a bank account.
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/SVV7777K
0
大学英语四级
相关试题推荐
Asisknowntoall,theorganizationandmanagementofwagesandsalariesarevery【B1】______.Generallyspeaking,theAccounts
What’syourearliestchildhoodmemory?Canyourememberlearningtowalk?Ortalk?Thefirsttimeyou【C1】______thunderorwatc
HenryFord,thefamousU.S.inventorandcarmanufacturer,oncesaid,"ThebusinessofAmericaisbusiness."Bythishemeantth
A、Thekeysourceofconnections.B、Thetimespentwithothers.C、Thekindofsocialcontact.D、Thedegreeofsolitude.B
Noonewhoreadsthenewspaperscandoubttheseriousnessofcrimeinthiscountry.Notaday【C1】______withoutnumerousrobber
Noonewhoreadsthenewspaperscandoubttheseriousnessofcrimeinthiscountry.Notaday【C1】______withoutnumerousrobber
TravelingonBritishpublictransportcouldbecomeapleasurable,artisticandeducationalexperience,accordingtoareport.Bu
TravelingonBritishpublictransportcouldbecomeapleasurable,artisticandeducationalexperience,accordingtoareport.Bu
A、Thepolicewanttotalktothemainactor.B、Themainactorforgottocome.C、Themainactorisdelayedbytraffic.D、Therewa
Althoughthedangersofalcoholarewellknownandhavebeenwidelypublicized,theremaybeanother【C1】______thatwehaven’t
随机试题
求函数的麦(马)克劳林展开式,并由此证明
Didyoueverhavesomeone’snameonthetipofyourtongueandyetyouwereunabletorecallit?【C1】______thishappensagain,do
造血微环境的成分不包括
现有产品评价与整顿中所采用的波士顿矩阵法使用的比率是()。
在对立论中,社会主义与市场经济的关系是()。
按照最终用途,总供给可以划分为()和()。
汉代选拔和任用官吏的方法有()
2010年7月,甲成立了一公司,宣称只要购买该公司999元的产品,便可成为“商务代表”,获取发展人员资格,并以发展人员的数量支付报酬。甲共引诱2987人参加并形成了五级销售网络,骗取财物总值200万余元。对甲的行为()。(2013一专一
Accordingtothetalk,howdidvitaminsloseinone’sbody?
Traditionally,theAmericanfarmerhasalwaysbeenindependentandhard-working.Intheeighteenthcenturyfarmerswerequites
最新回复
(
0
)