People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2017届高三英语(北师大版广东专用)一轮复习课件:M4 unit 12《Culture Shock》(第1课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M7 unit 20《New Frontiers》(第2课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M7 unit 19《Language》(第2课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M3 unit 9《Wheels》(第1课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M8 unit 22《Environmental Protection》
2017届高三英语(北师大版广东专用)一轮复习课件:M5 unit 15《Learning》(第2课时)
国际英语资讯:Iraqi airstrikes bomb meeting of IS commanders in western Iraq
高考英语作文素材:游览长城 Visiting the Great Wall
2017届高三英语(北师大版广东专用)一轮复习课件:M8 unit 24《Society》
2017届高三英语(北师大版广东专用)一轮复习课件:M7 unit 21《Human biology》(第1课时)
国际英语资讯:Turkish shelling kills 60 civilians in Syrias al-Bab
体坛英语资讯:Pistons overcome 16-point deficit to stun Raptors
2017届高三英语(北师大版广东专用)一轮复习课件:M6 unit 16《Stories》(第2课时)
2017年高考语法分类:定语从句和名词性从句小结(有讲解以及最新试题解析)
2017年高考语法分类:动词时态和语态小结(有讲解以及最新试题解析)
国际英语资讯:EU revises up eurozone economic outlook despite uncertainties
高考英语作文素材:有礼貌与没礼貌 Good Manners and Bad Manners
2017届高三广东北师大版英语一轮复习学案:M2 unit 4《Cyberspace》(1)
2017届高三英语(北师大版广东专用)一轮复习课件:M6 unit 18《Beauty》(第2课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M7 unit 19《Language》(第1课时)
2017届高三广东北师大版英语一轮复习学案:M1 unit 1《Lifestyles》(2)
2017届高三英语(北师大版广东专用)一轮复习课件:M3 unit 9《Wheels》(第2课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M5 unit 15《Learning》(第1课时)
2017届高三广东北师大版英语一轮复习学案:M1 unit 2《heroes》(2)
2017届高三广东北师大版英语一轮复习学案:M1 unit 1《Lifestyles》(1)
2017届高三英语(北师大版广东专用)一轮复习课件:M5 unit 13《People》(第2课时)
2017届高三英语(北师大版广东专用)一轮复习课件:M4 unit 10 《Money》(第1课时)
国内英语资讯:Economic Watch: China to further squeeze asset bubble in 2017
2017届高三英语(北师大版广东专用)一轮复习课件:M6 unit 17《Laughter》(第2课时)
高考英语作文素材:做你自己 Be YourSelf
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |