People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
面试英语:为实习面试做准备 了解公司和行业(视频)
英语口语面试(九):薪金期望
为朋友两肋插刀:如何帮助朋友找工作
特别需要注意的英文简历细节
英文简历范文2:RESUME
面试英语:8招提升你在雇主心中的身价(双语)
英语口语面试(十):面试结束
专家指导面试英语技巧(视频)
外企面试自我介绍加分句子
金九银十求职季:面试你准备好了吗
如何应对英语电话面试
英语口语面试(十二):询问结果
面试英语:外企英语电话面试应急模拟
从外企习惯学习英文简历样板
面试英语:注意面试前的细节会让你事倍功半(视频)
面试英语:收到offer前需要了解哪些问题
英语必备:求职信模板
英文求职信模板!
英文简历范文
英文简历-会计
面试完美英语自我介绍2
英语口语面试(三):性格和爱好
面试英语:好的英文自我介绍是面试成功的一半
面试英语:这样着装让人眼前一亮(视频)
电机系毕业生英文简历模板
面试英语:看看老外是怎么面试的(视频)
写好英文求职信
自我介绍:面试英语
英文简历:经理助理)
英文求职信模范文
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |