首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
admin
2019-01-01
35
问题
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a consensual hallucination experienced daily by billions of legitimate operators" and "a graphic representation of data abstracted from the banks of every computer in the human system."
The myriad connections forged by these computing devices have brought tremendous benefits to everyone who uses the web to tap into humanity’s collective store of knowledge every day. But data breaches are becoming ever bigger and more common. Last year over 800m records were lost.
The potential damage, though, extends well beyond such commercial incursions. America’s president, Barack Obama, said in a White House press release earlier this year that cyber-threats "pose one of the gravest national-security dangers" the country is facing.
Securing cyberspace is becoming harder. Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly. A recent estimate by the Centre for Strategic and International Studies (CEIS), puts the annual global cost of digital crime and intellectual-property theft at $445 billion—a sum roughly equivalent to the GDP of a smallish rich European country such as Austria.
There is also the risk of cyber-sabotage. Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids and communications networks. Such attacks are hard to pull off, but not impossible.
The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets. One is to ensure that organizations get the basics of cyber-security right. There is also a need to provide incentives to improve cyber-security, be they carrots or sticks.
Cyberspace is about to undergo another massive change. Over the next few years billions of new devices, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the web and make them more useful.
But unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked. Plenty of people are eager to take advantage of any weaknesses they may spot. Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders. It has grown up with a vengeance.
The author’ s attitude toward hackers is _____.
选项
A、skeptical
B、ambiguous
C、negative
D、sympathetic
答案
C
解析
本题为态度题,根据题干关键词定位到文章最后一段。末句指出“黑客们通常是大学里的书呆子们,他们在卧室敲着电脑惹怒他们的长辈,他们的成长带有一种逆反心理”。由此可知,作者对黑客并无好感。故C项“消极的”符合作者的态度。A项“怀疑的”、B 项“模糊的”和D项“同情的”均不符合题意。故选C。
转载请注明原文地址:https://kaotiyun.com/show/iY6Z777K
0
考研英语一
相关试题推荐
Theproblemwithtoday’shousingcrisis,politically,isthatitisjustnotallthatvisible.AttheendoftheSecondWorldWa
Theproblemwithtoday’shousingcrisis,politically,isthatitisjustnotallthatvisible.AttheendoftheSecondWorldWa
Theproblemwithtoday’shousingcrisis,politically,isthatitisjustnotallthatvisible.AttheendoftheSecondWorldWa
InalabinOxfordUniversity’sexperimentalpsychologydepartment,researcherRoiCohenKa-doshistestingarelativelynewbra
Consumersandproducersobviouslymakedecisionsthatmoldtheeconomy,butthereisathirdmajor【C1】______toconsidertherole
Eatinghealthilycostsabout$1.50moreperpersondaily,accordingtothemostthoroughreviewyetoftheaffordabilityofahe
Eatinghealthilycostsabout$1.50moreperpersondaily,accordingtothemostthoroughreviewyetoftheaffordabilityofahe
Thearrivalofthemass-producedcar,justoveracenturyago,causeda(n)【C1】______ofbusinesscreation.Firstcamethemakers
[A]Watchingrelatedexpensesandmakingwisechoice[B]Payingattentiontodetails[C]Weighingyourfinancialgoalsandexpec
Stratford-on-Avon,asweallknow,hasonlyoneindustry—WilliamShakespeare—buttherearetwodistinctlyseparateandincreasingl
随机试题
患者,女性,47岁。主诉外阴瘙痒,外阴及阴道灼痛,白带增多呈豆腐渣样,有时伴尿频、尿频、尿痛。阴道分泌物检查:杆菌(-),上皮细胞(-),大量脓细胞和球菌。最可能的临床诊断是
某铁矿公司根据安全管理协议的要求,派驻张某对承包采掘施工的公司进行现场监督捡查,协涮作业过程中有关事项。根据对承包商作业过程监督管理的要求,作业过程监督管理的内容包括()。
某混凝土工程,9月份计划工程量为5000m3,计划单价为400元/m3,而9月份实际完成工程量为4000m3,实际单价为410元/m3,则该工程9月份的进度偏差为()万元。
某国政府在半年内两次宣布降低购房按揭贷款的利率,因此很多潜在的购房者都处于持币待购的状态,进一步观望利率能否再探新低,所以六月份新建房屋的销售量大幅下降。但是,一个值得关注的现象是,在新建房屋销售量大幅下降的同时,新建房屋销售的平均价格却在快速上涨。
小李是某乳制品企业的质量经理,带领质量部5位同志负责全企业的质量工作,包括质量检验、质量控制和质量管理体系的实施。该企业早在5年前就通过了ISO9001质量管理体系认证。在贯标认证初期,质量管理体系对规范质量管理发挥了很大作用,由于产品质量稳定,顾客满意率
20世纪初,我国出现的第一本教育心理学著作是1908年由房东岳翻译日本小原又一著的()
假想防卫:是指客观上不存在正在进行的不法侵害,而行为人主观上误认为正在发生不法侵害,而对想象的“侵害人”实施了正当防卫。下列不属于假想防卫的是()。
担任香港特别行政区长官的条件是()。
在计算机网络中,英文缩写LAN的中文名是________。
Fewhumanrecordssurviveforlong,the16000-year-oldPaleolithiccavepaintingsatLascaux,France,beingoneexception.Now
最新回复
(
0
)