首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
admin
2010-05-26
73
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil- lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to their home or office. Companies doing business over the
Internet need sophisticated security measures to protect credit card, hank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain un-authorized access to the organization’s computer systems and data.
The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online network
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/qVV7777K
0
大学英语四级
相关试题推荐
Asisknowntoall,theorganizationandmanagementofwagesandsalariesarevery【B1】______.Generallyspeaking,theAccounts
A、Becauseofthepossibilityofbadweather.B、Becauseofthefaculty’scontracts.C、Becauseofthesummerscheduleofclasses.
Noonewhoreadsthenewspaperscandoubttheseriousnessofcrimeinthiscountry.Notaday【C1】______withoutnumerousrobber
Noonewhoreadsthenewspaperscandoubttheseriousnessofcrimeinthiscountry.Notaday【C1】______withoutnumerousrobber
BuyingOnlineWhybuyonline?It’slittlewonderthatnewbuyersquicklylearntoloveInternetshopping.Atthemoment,
Ialwaysthinkofbookswith【B1】______feeling,beingdeeply【B2】______tothem,asIam,forthe【B3】______theyhavebroughtme.
TravelingonBritishpublictransportcouldbecomeapleasurable,artisticandeducationalexperience,accordingtoareport.Bu
TravelingonBritishpublictransportcouldbecomeapleasurable,artisticandeducationalexperience,accordingtoareport.Bu
A、Sheisaprofessionalwriter.B、Sheisanaccountant.C、Sheisaneconomist.D、Sheisabusinesswoman.B
Oneofthe【C1】______beautifulsightsinthebirdworldisthemalepeafowl,orpeacock,strutting(炫耀)proudly【C2】______with
随机试题
被鲁迅在《魏晋风度及文章与药及酒之关系》中誉为“改造文章的祖师”’的是_______。
属于既病防变的是
A.右归丸B.独活寄生汤加附子C.四妙丸D.身痛逐瘀汤肾阳虚腰痛,治宜
A.易致肿疡B.易伤肺C.善行而数变D.多挟湿E.易伤阳气
监理的基本方法就是控制,基本工作是“三管”“两控”“一协调”。()
室外楼梯临空高度在24m以下时,栏杆高度不应低于()m。
制梁场主要机械设备需要配置()、混凝土输送泵、混凝土罐车、蒸汽养护系统以及模板系统等。
错账的更正方法一般有( )。
课程的文本一般表现为()。
在C++中,打开一个文件,就是将这个文件与一个()建立关联,关闭一个文件,就是取消这种关联。
最新回复
(
0
)