People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2014秋冀教版英语五上《Lesson 10 The U.K》导学案
2014秋冀教版英语五上《Lesson 1 Li Ming’s Big Family》教案
2014秋冀教版英语六上《Lesson 16 A Skating Lesson》教案
2014秋冀教版英语六上《Lesson 11 Always Do Your Homework》教学设计
2016春冀教版(三起)六下Lesson 2《At the sports shop》ppt课件4
2016春冀教版(三起)六下Lesson 1《PingPong and Basketball》ppt课件6
2014秋冀教版英语五上《Lesson 13 Beijing Is Great》教案
2014秋冀教版英语五上《Lesson 24 Year Animals》导学案
2014秋冀教版英语六上《Lesson 2 Jenny’s House》教案
2016春冀教版(三起)六下Lesson 1《PingPong and Basketball》ppt课件3
2014秋冀教版英语五上《Lesson 5 Having Fun Together》导学案
2016春冀教版(三起)六下Lesson 22《Surprise》ppt课件1
2016春冀教版(三起)六下Lesson 20《Looking at photos》ppt课件2
2016春冀教版(三起)六下Lesson 2《At the sports shop》ppt课件3
2016春冀教版(三起)六下Lesson 2《At the sports shop》ppt课件1
2016春冀教版(三起)六下Lesson 18《Three kites in the sky》ppt课件3
2016春冀教版(三起)六下Lesson 2《At the sports shop》ppt课件2
2016春冀教版(三起)六下Lesson 24《Danny’s surprise cake》ppt课件2
2014秋冀教版英语五上《Lesson 11 Australia》导学案
2016春冀教版(三起)六下Lesson 19《Buying gifts》ppt课件1
2016春冀教版(三起)六下Lesson 20《Looking at photos》ppt课件1
2016春冀教版(三起)六下Lesson 19《Buying gifts》ppt课件2
2016春冀教版(三起)六下Lesson 23《Good-bye》ppt课件3
2014秋冀教版英语五上《Lesson 9 The U.S》导学案
2014秋冀教版英语五上《Lesson 8 Canada》导学案
2014秋冀教版英语六上《Lesson 20 Christmas Tree》教案
2014秋冀教版英语五上《Lesson 8 Canada》教案
2016春冀教版(三起)六下Lesson 23《Good-bye》ppt课件2
2016春冀教版(三起)六下Lesson 1《PingPong and Basketball》ppt课件2
2014秋冀教版英语六上《Lesson 15 Winter Fun》教案