Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
雅思听力辅导:提高雅思听力的6个实用小帖士
托业听力指导:听力有规律
雅思听力指导有章可循
雅思听力指导:听力中的五从无忌
雅思听力难题解析:地图题
雅思听力难题解析:搭配题
雅思听力考试特点与国内英语考试的区别
托业听力考试机考Tips
托福听力:盘点60个最难记的托福听力高频词
雅思听力临时抱佛脚:需要注意的六点
雅思听力辅导:听力技巧全介绍(1)
雅思听力场景词汇:看病场景
雅思听力备考的三原则和四个字
雅思听力辅导:听力题干生词的处理办法
四级考试听力高分技巧
雅思听力技巧:怎样应对听力第四部分
雅思写作辅导:写作老题连绵
雅思听力技巧辅导:关注特殊词汇
英语四级六级听力中的态度词汇
雅思听力辅导:听力考试中的同义置换
托福听力10种问题大揭露
切记:雅思听力审题不能犯的四大错误
英语四六级:英语听力技巧
英语四级听力得分技巧
雅思听力最难部分Section4的应试技巧
雅思听力难题解析:选择题
雅思听力场景词汇:生活咨询场景
托福听力场景词汇:银行交易场景
雅思听力技巧大搜罗
高分技巧:雅思听力考试时间的高效利用方法
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |