Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2016届高考英语二轮复习阶段滚动补偿练:3
2017届高考英语一轮复习知识梳理练习:必修1 Unit 1 Lifestyles(北师大版)
国际英语资讯:Russian State Duma chairman suggests CSTO to develop common criteria of recognizing terrorist
2016届广东天河区重点高中高考英语专题训练课件: 名词、冠词与介词01
2016届广东天河区重点高中高考英语专题训练课件: 代词02
2016届广东天河区重点高中高考英语专题训练课件: 动词和动词短语01
2017届高考英语一轮复习知识梳理练习:选修7 Unit 20 New Frontiers(北师大版)
国内英语资讯: Beijing tightens individual purchase of commercial building
2017届高考英语一轮复习知识梳理练习:必修3 Unit 7 The Sea(北师大版)
体坛英语资讯:Germany keep perfect record, England down Lithuania in World Cup qualifiers
体坛英语资讯:Scolari: I want to coach at another World Cup, but not China
2016届高考英语二轮复习阶段滚动补偿练:11
2016届高考英语二轮复习检测训练:选修8 Unit 3 Inventors and inventions(新人教版)
2017届高考英语一轮复习知识梳理练习:必修1 Unit 2 Heroes(北师大版)
2016届高考英语二轮复习阶段滚动补偿练:7
2016届广东天河区重点高中高考英语专题训练课件: 冠词
体坛英语资讯:Slovakia beats Malta 3-1 in World Cup qualifier
2016届高考英语二轮复习阶段滚动补偿练:12
2016届高考英语二轮复习阶段滚动补偿练:6
2016届广东天河区重点高中高考英语专题训练课件: 连词与状语从句01
2017届高考英语一轮复习知识梳理练习:必修2 Unit 6 Design(北师大版)
国内英语资讯: China Merchants Bank net profit rises in 2016
2016届高考英语二轮复习检测训练:选修8 Unit 1 A land of diversity(新人教版)
2016届高考英语二轮复习检测训练:选修8 Unit 2 Cloning(新人教版)
博鳌论坛全球化宣言全文(双语)
2016届高考英语二轮复习阶段滚动补偿练:10
国际英语资讯:GERB party leads in Bulgarias parliamentary elections: exit polls
2017届高考英语一轮复习知识梳理练习:选修7 Unit 21 Human Biology(北师大版)
2016届高考英语二轮复习阶段滚动补偿练:5
这些时尚单品今年还流行 你入手了吗?
不限 |
英语教案 |
英语课件 |
英语试题 |
不限 |
不限 |
上册 |
下册 |
不限 |