首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U
admin
2015-02-12
51
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U.S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 million U.S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar banks" are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to their home or office. Companies doing business over the Internet need sophisticated security measures to protect credit card, bank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain unauthorized access to the organization’s computer systems and data.
What is this text mainly about?
选项
A、Conveniences brought to consumers through use of the Internet.
B、Implications of increasing commercial use of the Internet.
C、Security risks posed by commercial use of the Internet.
D、Advantages of Internet banking versus traditional banking.
答案
B
解析
属主旨思想题。本题考查文章的主题思想。本文第一段讲的是因特网由最初发展为网上商务的历史,第二段专门介绍了网上银行,第三段重点说明了网上商务的注意问题。由此不难看出全文都是围绕着网上商务展开的,因此选项B正确。选项A、C、D的内容分别是文中第一、三、二段描述的细节,不能概括全文。
转载请注明原文地址:https://kaotiyun.com/show/u7K4777K
0
考研英语一
相关试题推荐
VideoGameandChildtheSchoolExpressResearchersaretryingtotellparentssomethingaboutwhatkindsofvideogameschi
CheatsinCollegeAdmissionsExamsandCounterplansWhathappenstostudentswhocheatonthetwocollegeadmissionsexams,
ObamaDeclaresNewAutocarTailGasEmissionsandEconomyEnergyStandardAshestoodintherosegardenonMay19withstat
AlleviatetheBadReactionofFlyingJetLagWiththeglobaleconomynowtakingmoreexecutivestofar-awayplaceslikeBeij
TheUniversityMakesUseofKnowledgetoObtainEconomicInterestNobodyeverwentintoacademiatomakeafastbuck.Profes
AmericanIncentiveStudentofUniversityEconomizesaCommissaryTheonce-seen-everywherecafeteriatray.withsomanyglass
AmericanIllegalImmigrantNumberDescendsIllegalimmigration,whichhassparkedpoliticalandsocialdisorderincommuniti
Inthetwodecadesbetween1929and1949,sculptureintheUnitedStatessustainedwhatwasprobablythegreatestexpansionins
Itmayturnoutthatthe"digitaldivide"—oneofthemostfashionablepoliticalslogansofrecentyearsislargelyfiction.Asy
Thereweretwowidelydivergentinfluencesontheearlydevelopmentofstatisticalmethods.Statisticshadamotherwhowasdedi
随机试题
A、麻醉药品B、精神药品C、处方药D、非处方药E、兴奋剂连续使用后易产生躯体依赖性,能成瘾药品是
会计凭证按其填制程序和用途不同,可分为()。
对于擅自开办资产管理业务的证券公司,中国证监会将责令改正,并处以警告,罚款。()
当需要证实组织有能力稳定地提供满足顾客和适用的法律法规要求的产品时,组织不能采用_________。
设f(x)在x=0的某个邻域内存在二阶导数,且=1,则f’’(0)的值为()。
解不等式组:.
把下面的六个图形分为两类,使每一类图形都有各自的共同特征或规律,分类正确的一项是:
设二重积分I=(x2+y2)dxdy,其中D是由曲线x2+y2=2x所围第一象限的平面区域,则I=________。
设栈的存储空间为S(1:50),初始状态为top=-1。现经过一系列正常的入栈与退栈操作后,top=30,则栈中的元素个数为()
A、正确B、错误B
最新回复
(
0
)