People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
英语语法Q&A
牛津实用英语语法:335 用于go和come之后的目的不定式
易混淆的数目问题
无敌英语语法(初级版)
牛津实用英语语法:364 不规则动词
牛津实用英语语法:334 不定式表示目的
牛津实用英语语法:320间接引语中的命令、请求、劝告
牛津实用英语语法:336 目的从句
牛津实用英语语法:310 间接引语中的虚拟过去时
魔法英语语法手册第三章冠词二、定冠词the的用法
牛津实用英语语法:363 动词+介词/副词的组合
牛津实用英语语法:349 基数词的几点注意事项
英语同源副词辨析
介词用法大全
牛津实用英语语法:362 短语动词
牛津实用英语语法:353度量衡
牛津实用英语语法:337 in case和lest
不人道的“量词”
魔法英语语法手册第五章形容词二、形容词的位置
牛津实用英语语法:344 位于某些形容词/分词之后的that从句
牛津实用英语语法:354 引语
牛津实用英语语法:359 以字母y结尾的词
魔法英语语法手册第一章名词三、名词的格
句子转折词的桥梁
牛津实用英语语法:332 as意为when/while(当……时)
牛津实用英语语法:340 让步从句
魔法英语语法手册第二章代词五、不定代词
英语中表示强调的八种方式
英文最基本的五个时态
区别Sorry与Excuse Me
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |