Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
GRE作文长短和分数高低有关系吗
GRE写作不要跑偏题
如何运用GRE作文模版
GRE考试时的写作程序
最常用的GRE写作素材
让GRE作文出彩的方法技巧
GRE写作范文:teamwork
GRE作文少不了的句式
2014GRE写作素材库
四个方法写好GRE作文issue部分
几大句型为GRE作文加分
关于GRE写作是否要写提纲
GRE作文考试经验
GRE作文范文:呼吁孩子阅读
GRE作文范文:学科
如何让GRE作文脱颖而出
GRE作文argument范文分析
GRE写作精句总结
GRE写作范文:technology and war
GRE写作高分句型
2014年GRE填空题步骤分析
GRE作文常见话题经典写作句型总结
2014年GRE写作要点
GRE写作评分标准
2014年GRE写作常用经典句子
GRE作文万能模版
助GRE作文得高分的八大诀窍
GRE作文实例:个人责任
GRE作文满分机经分享
GRE作文素材:亚里士多德
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |