Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2015届高考英语一轮跟踪训练:必修3 unit5《canada — the true north》
2015届高考英语一轮跟踪训练:必修3 unit4《astronomy the science of the stars》
2015届高考英语一轮复习教案:Module 6《The Internet and Telecommunications》(外研版必修一)
2015届高考英语一轮基础语法专项训练:专题四 《名词性从句》(人教版)
外媒看中国:雄安新区一夜走红变成投资热点
2015届高考英语一轮跟踪训练:必修4 unit1《women of achievement》
2015届高考英语一轮跟踪训练:必修4 unit5《theme parks》
2015届高考英语一轮基础语法专项训练:专题十三 《名词》(人教版)
新研究表明:能量饮品混酒喝会增加受伤的风险
2015届高考英语一轮基础语法专项训练:专题七 《情态动词和虚拟语气》(人教版)
2015届高考英语一轮基础语法专项训练:专题十二 《冠词》(人教版)
2015届高考英语一轮跟踪训练:必修4 unit4《body language》
外媒看中国:中国女人开网店,厉害到飞起!
2015届高考英语一轮跟踪训练:必修5 unit2《the united kingdom》
2015届高考英语一轮跟踪训练:必修3 unit3《the million pound bank note》
2015届高考英语一轮跟踪训练:选修6 unit1《art》
2015届高考英语一轮跟踪训练:必修5 unit1《great scientists》
2015届高考英语一轮跟踪训练:必修2 unit5《music》
2015届高考英语一轮基础语法专项训练:专题十 《介词和介词短语》(人教版)
2015届高考英语一轮跟踪训练:选修8 unit3《inventors and inventions》
2015届高考英语一轮跟踪训练:选修6 unit2《poems》
3月资讯热词汇总
2015届高考英语一轮跟踪训练:选修6 unit3《a healthy life》
人类起源于外星?数字37或是外星人留下的证据
2015届高考英语一轮跟踪训练:必修5 unit4《making the news》
2015届高考英语一轮跟踪训练:选修8 unit4《pygmalion》
2015届高考英语一轮基础语法专项训练:专题五 《定语从句》(人教版)
性格不讨喜,反而易成功?
水果促进大脑的进化:发育得更大
2015届高考英语一轮基础语法专项训练:专题十 《状语从句》(人教版)
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |