首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer w
Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer w
admin
2009-06-15
94
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves. Some do --personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house. He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory. He could even take control of the entire system by placing his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his eve~ having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news—brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files. A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication m the main reason for using computers in the first place.
选项
A、to show that a hacker is more dangerous than a thief.
B、to tell people that thieves like to steal computers nowadays.
C、to demand that a protective computer system should be set up against thieves.
D、to demonstrate that hackers and thieves are the same people.
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/pHLd777K
本试题收录于:
职称英语理工类A级题库职称英语分类
0
职称英语理工类A级
职称英语
相关试题推荐
Accordingtothepassage,theexhaustfromacarenginecouldprobablybecheckedby______.Accordingtothepassage,whichof
EattoLiveAmeager(不足的)dietmaygiveyouhealthandlonglife,butit’snotmuchfun—anditmightnotevenbenecessary.
11.Ithardfortheyoungpeopletoimaginewhatsevereconditionstheirparentsoncelivedunder.
HighStressMayDamageMemoryAccordingtoareportissuedinMay1998,elderlypeoplewhohaveconsistentlyhighbloodleve
Thesepaintingsareconsideredbymanytobe(authentic).
Icebergs1Icebergsareamongnature’smostspectacular(壮观的)creations,andyetmostpeoplehaveneverseenone.Avagueairo
OilandEconomyCouldthebadolddaysofeconomicdeclinebeabouttoreturn?SinceOPECagreedtosupplycutsinMarch,th
DiningCustomEverylandhasitsowndiningcustom,andtheUnitedStatesisnoexception.Americansfeelthatthefirstrul
Theoriginalexperimentcannotbeexactlyduplicated.
AvalancheandItsSafetyAnavalancheisasuddenandrapidflowofsnow,oftenmixedwithairandwater,downamountainside.A
随机试题
起动保护电路一般都是依靠交流发电机的中性点电压以及相应的继电器控制来完成。()
患者,女性,28岁。妊娠8周,伴怕热、多汗、心悸、手颤2周。查体:无突眼征,甲状腺Ⅱ度弥漫性肿大,可闻及血管杂音,心率108次/分。双上肢平举细颤。下列哪项对妊娠并甲亢诊断无帮助
2008年北京奥运会上争夺奖牌的事实,使我们明白了一个道理:在失败还未成为最后的事实时,决不能轻易接受失败!在胜利尚存一丝微弱的希望时,仍要拼尽全力去争取胜利!否则,就不是真正的强者。由上述题干可推出以下哪个选项?()
单位银行结算账户按用途分为哪些种类?各自的使用范围是什么?
在价、量历史资料基础下进行的统计、数学计算、绘制图表的方法是技术分析的主要手段。()
A注册会计师负责审计甲公司2008年度财务报表。在确定审计证据的充分性和适当性时,A注册会计师遇到下列事项,请代为作出正确的专业判断。在确定审计证据的可靠性时,下列表述中不正确的是()。
甲明知乙所提供的五粮液为假酒,但还是买入,经调查该酒确为假酒。下列选项中,表述正确的是()。
有限责任公司区别于股份有限公司的重要特征之一是()
=______________.
WarmerClimateWillBakeTropicalBugsGlobalwarmingcouldcooktropicalinsects,withunpredictableknock-oneffects,say
最新回复
(
0
)