People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
汉译英中需注意的特殊问题
考研英语翻译讲词析句(25)
考研英语英译汉难句分类辨析之倒装句
陈清霖博士教你如何翻译
英语翻译训练方法之——科技英语的特点与翻译
考研英语翻译中应该注意的英汉五大区别
考研英语英译汉难句分类辨析之定语从句
考研英语翻译高分技巧
考研英汉翻译实践笔记之放在名词后的分词
考研英语翻译试题的解答技巧
考研指导:考研英语翻译策略
高分攻略:教你如何攻破考研英语英译汉
详解考研英语翻译法则之翻译五步骤
英语翻译训练方法之——谈谈英语定语从句的汉译
考研英语长难句翻译五大高分技巧
英语长句翻译基本功
英语翻译训练方法之——谈科技翻译中的逻辑判断
考研英汉翻译笔记之起形容词作用的分词
考研英语翻译讲词析句(35)
考研英语英译汉难句分类辨析之省略法
研究生入学考试英语翻译的步骤
名师指导: 考研英语翻译备考策略及方法
2014年考研英汉翻译方法总论与高分攻略
考研英语英译汉中的惯用法
考研英语翻译中一些常用结构及其翻译
研究生入学考试英语翻译的方法
全方位攻克2006考研英语英译汉翻译题型
考研之英汉翻译方法总论与高分攻略
研英翻译重难点详解:并列平行结构(3)
研英翻译重难点详解:否定句(1)
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |