首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
admin
2010-05-26
35
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil- lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to their home or office. Companies doing business over the
Internet need sophisticated security measures to protect credit card, hank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain un-authorized access to the organization’s computer systems and data.
The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online network
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/qVV7777K
0
大学英语四级
相关试题推荐
A、Atapark.B、Atthebeach.C、AtDave’shouse.D、Byariver.D
ResearchersinJapanhavediscoveredsomeeye-openingnewsaboutcoffee:Itmayhelp【S1】______themostcommontypeofliverca
Peopleinallpartsoftheworldare【B1】______."NoTobaccoDay".ItisthedaywhentheWorldHealthOrganizationappeals
TheEarlyHistoryofHarvardUniversityHarvardUniversity,whichcelebratedits350thanniversaryin1986,istheoldesti
A、Thecupisalreadyfull.B、Sheisfull.C、Shewouldbeimpolitetoacceptanother.D、Shethinksshewouldbefoolishnottore
A、Attheairport.B、Inahotel.C、Inatravelagency.D、Atthereceptiondesk.C
A、Sheworksinalawoffice.B、Sheworksforanansweringservice.C、Sheworksatanemploymentagency.D、Sheisateacher.C
TodayI’vereturnedtoChicagotodiscussanotherissuerelatingtooursecurity,andthat’stheneedforustoimprovetheheal
A、Herbackwashurtduringthemeeting.B、Sheagreedthatitwasagoodmeeting.C、Theproposalshouldbesentback.D、Hissuppo
A、Work.B、Study.C、Eatdinner.D、Seeamovie.B
随机试题
A.腹痛、便血、腹部肿物B.腹痛、发热、黄疸C.排便习惯改变D.急性弥漫性腹膜炎E.腹痛、呕血、黑粪肠套叠可能出现的症状
下列选项中,适宜采用市场渗透战略的是()。
具有祛痰止咳功效的药物是
A.肌腱损伤B.骨折延迟愈合C.血管神经损伤D.骨折不愈合E.骨筋膜室综合征肱骨外髁颈骨折易造成
邪正盛衰决定着()
一个典型的计算机网络主要由两大部分组成,即:
2005年3月,胡锦涛总书记就新形势下两岸关系提出了()等意见。
和资本资产定价模型相比,套利定价模型并没有指出决定资产风险溢价的因素是哪些。我们该如何决定应该包含哪些因素?公司规模可以是套利定价模型中的一个重要因素吗?
流通中的货币需要量是考察经济生活运行的重要指标,假设某国去年的商品价格总额为24万亿元,流通需要量为3亿元,若今年该国商品价格总额增长10%,其他条件不变,今年流通中需要的货币量为
Thehotelprovidesfreeshuttle______tothetrainstationandtheairport.
最新回复
(
0
)