People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2014年GRE考试阅读模拟试题6
对于GRE阅读 分析结果挺重要
GRE阅读考试排除法实例分析
如何梳理GRE阅读文章结构?
GRE阅读:考生容易犯的错误
GRE阅读学术词汇如何应对
GRE阅读:逻辑题解析
GRE阅读:应该多积累国外知识
GRE阅读机经:地球冷暖周期
2014年GRE考试阅读素材汇集(一)
GRE阅读解题技巧:学会取舍
GRE阅读复习重点在哪
新GRE阅读词汇题考查方式
新GRE阅读长难句实例解析
揭秘GRE阅读难题及破解方法
2014年GRE考试阅读模拟试题2
细致解读新GRE阅读不同题型 写作用意题
新GRE阅读长难句复习解析(1)
2014年GRE考试阅读模拟试题5
GRE阅读:考古学
GRE阅读难句语法结构:否定句结构
如何准备GRE阅读的词汇和句子
新GRE阅读文章的特点有什么
该怎么正确对待GRE阅读
GRE高分作文写作方法
新GRE阅读答题习惯简介
GRE阅读:能源
2014年GRE考试阅读素材汇集(二)
2014年GRE考试阅读模拟试题1
2014年GRE考试阅读素材汇集(三)
不限 |
英语教案 |
英语课件 |
英语试题 |
不限 |
不限 |
上册 |
下册 |
不限 |