首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer w
Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer w
admin
2009-06-15
76
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house. He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory. He could even take control of the entire system by placing his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his eve~ having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news—brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files. A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication m the main reason for using computers in the first place.
选项
A、to show that a hacker is more dangerous than a thief.
B、to tell people that thieves like to steal computers nowadays.
C、to demand that a protective computer system should be set up against thieves.
D、to demonstrate that hackers and thieves are the same people.
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/pHLd777K
本试题收录于:
职称英语理工类A级题库职称英语分类
0
职称英语理工类A级
职称英语
相关试题推荐
11.Ithardfortheyoungpeopletoimaginewhatsevereconditionstheirparentsoncelivedunder.
HighStressMayDamageMemoryAccordingtoareportissuedinMay1998,elderlypeoplewhohaveconsistentlyhighbloodleve
MiddleAge:ALowPointforMostPeoplearoundtheglobehittheheightoftheirmiseryanddepressioninmiddle【51】______,
EatingPotatoesGivesYourImmuneSystemaBoostEatingpotatoesisnotonlygoodforbowelhealth,butalsoforthewholei
Initssecondgeneration,thesmallestBMWbecomesmorefuel-efficientinitsEuropeanversion.
FirstaidmaybringaboutallthefollowingresultsEXCEPTInadministeringfirstaidtoavictim,youshouldfirstofall
MotherNatureShowsHerStrengthTornadoes(龙卷风)andheavythunderstormsmovedacrosstheGreatLakesandintoTrumbullCounty
Onlythosewhoworkedhereformorethanfiveyearsareeligibleforthespecialpayment.
AvalancheandItsSafetyAnavalancheisasuddenandrapidflowofsnow,oftenmixedwithairandwater,downamountainside.A
AvalancheandItsSafetyAnavalancheisasuddenandrapidflowofsnow,oftenmixedwithairandwater,downamountainside.A
随机试题
中焦虚寒,痰浊内阻证。选用理中汤宜加脾胃虚寒,脾虚不摄的多涎证。选用理中汤,宜加
治疗肺胀之痰浊壅肺证,应首选的方剂是
关于生活垃圾填埋场HDPE膜铺设的做法,错误的有()。
关于固定资产折旧额的计算方法,表述不正确的是( )。
国际货物买卖合同中检验条款,主要包括()。
某工业企业为增值税一般纳税人,生产销售的产品适用17%的增值税税率,2008年8月发生下列业务:(1)购进原材料一批,取得增值税专用发票注明的价款为40万元,增值税为68000元。材料已经验收入库,款项尚未支付;(2)购进低值易耗品一批,
醉驾:吊销驾驶证
在一个单链表中,若删除p所指结点的后继结点,则执行(38)。
【L1】______and【L2】______affecthowpeoplevaluepersonalcontrolindecisionmaking,accordingtoanewstudyinBiologicalPsy
InternetPrivacyWiththerapiddevelopmentofe-commerce,companiesarenowcapableofcultivatingmore(1)______relationsh
最新回复
(
0
)