首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Whether you are logging on to your personal computer, using a credit card, or disarming a door security system, passwords or PIN
Whether you are logging on to your personal computer, using a credit card, or disarming a door security system, passwords or PIN
admin
2009-01-13
65
问题
Whether you are logging on to your personal computer, using a credit card, or disarming a door security system, passwords or PINs(personal identification numbers) jealously guard access to numerous regular operations. It is estimated that within ten years, consumers could be faced with handling more than 100 passwords! Given the popularity of passwords, how can you choose ones that are sufficiently complicated to be secure yet are simple enough to remember?
There are basic guidelines to bear in mind. First, don’t use as a password your name or that of a member of your family, even in modified form. Also avoid use of your telephone number, your Social Security number, or your address. Such information can easily be obtained by a determined hacker (黑客).
In addition, if possible, don’t use passwords made up entirely of letters or digits. A relatively simple computer program can crack such a code quickly: Finally, do not use a word that can be found in any dictionary, even a foreign-language one. Huge lists are available that contain words, place names, and proper names from all languages. Programs can test for variations of these words, such as if they are spelled backward, capitalized, or combined.
So, what kinds of passwords should be used? Usually ones that have a minimum of six to eight characters and that have a mixture of upper-and lower-case letters, digits, and punctuation (标点) symbols. How difficult is it to crack such a combination of characters? One source says that "a machine that could try one million passwords per second would require, on the average, over one hundred years."
How can you choose a combination that is easy to remember? Some suggest that you take the title of a favorite book or film or a line from a song or poem and use the first latter from each word as your password, adding capital letters, punctuation, or other characters. For example, "to be or not to be" could become "2B/not2B".
Other suggestions include taking two short words and link them with a punctuation character, such as "High?Bug" or "Song; Tree".
Taking into account the suggestions outlined above can help you to protect important information from unwanted hackers. Remember, too, the importance of changing your passwords regularly. Just a final comment, whatever passwords you decide to use, don’t pick any of the examples given above.
选项
A、How to strengthen security through a password.
B、How to choose a password that is easy to remember.
C、How to prevent your password from being cracked.
D、How to choose a safe and convenient password.
答案
D
解析
第二篇文章全文是关于计算机“密码”。文章第一段就出现了passwords和PINs。第二段谈到了选择既安全又简单易记的密码这一问题。后面的内容对这个问题作出了回答,因此答案为D。
转载请注明原文地址:https://kaotiyun.com/show/bkHO777K
0
在职攻硕英语联考
相关试题推荐
Iwonderifyourealizejusthowmanyothersshareyourproblem.Itissocommonforpeopletodistortthetruthaboutthemselve
Agreatdealofattentionisbeingpaidtodaytotheso-calleddigitaldivide—thedivisionoftheworldintotheinfo(informati
(复旦大学2011年试题)Aconsiderableamountofmedicalresearchisaimedatidentifyingriskfactorsfordisease.Therationalebehi
(清华大学2007年试题)Seariseasaconsequenceofglobalwarmingwouldimmediatelythreatenthatlargefractionoftheglobeliving
(北京航空航天大学2015年试题)Duringrecentyearswehaveheardmuchabout"race":howthisracedoescertainthingsandthatracebeliev
(中国矿业大学2015年试题)Oneofthemostfascinatingfieldsofpsychologyismemory.Thispassageisgoingto【C1】______afewthingsab
(中国矿业大学2015年试题)Oneofthemostfascinatingfieldsofpsychologyismemory.Thispassageisgoingto【C1】______afewthingsab
Inthisfactorythemachinesarenotregulated______butarejointlycontrolledbyacentralcomputersystem.
Whenyou’redrivingonamotorway,youmustobeythesignstellingyoutogetintotheright______.
Standardusageincludesthosewordsandexpressionsunderstood,used,andacceptedbyamajorityofthespeakersofalanguagei
随机试题
资本-帝国主义列强在中国开设的第一家银行是()
3km以上单线隧道应采用的出碴方式是()。
防止不合格并消除其产生原因的措施有()。
【2018上】科学技术知识的再生产有多种途径,其中最重要的途径是()。
下列情况属于侵犯公民肖像权的是:
CPU内部一般包括PC、MAR、MDR、IR等几个寄存器及若干通用寄存器。下图是指令LADRO,(X)的指令流程图,其功能是将主存X号单元的数据取到RO寄存器中,图中M表示主存。(1)请完成该指令流程图中未完成的部分。(2)重新画出当源操作数为间接寻
能力管理是所有IT服务绩效和能力问题的核心。能力管理的高级活动项目有三方面内容。下列选项中,()不属于这三方面的内容。
在SQLServer2008中,设某日用bk1和bk2设备对DB1数据库进行了如下备份操作(说明:括号中内容为备份开始时间):bk1设备:完整(10:00)、日志(11:00)、日志(13:00)、日志(15:00)bk2设备:差异(12:00)
Withthepossibleexceptionofequalrights,perhapsthemost【1】issueacrosstheUnitedStatestodayisthedeathpenalty.Many
_______,Tomremainsmodestandiswillingtoacceptsuggestionsfromothers.
最新回复
(
0
)