Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2017高考英语二轮专题限时训练8:非谓语动词
2017届高考英语二轮复习精品课件(广东专用)第4模块 信息匹配 专题3 获取知识相关的信息
2017届高考英语二轮复习精品课件(广东专用)第5模块 基础写作 专题1 记叙文型基础写作
2017届高考英语二轮复习精品课件(大纲版)第2模块 完形填空 专题1 记叙文型完形填空
2017届高考英语二轮复习精品课件(广东专用)第3模块 阅读理解 专题5 文化教育型阅读理解
2017届高考英语二轮复习精品课件(广东专用)第1模块 完形填空 专题4 说明文型完形填空
2017届英语一轮精品复习导学案:Unit3《Looking good,feeling good》(译林牛津版必修1)
2017届高考英语二轮复习精品课件(课标版)第1部分 单项填空 专题9 动词的时态与语态
2017届英语一轮精品复习导学案:Unit2《Wish you were here》(译林牛津版必修2)
2017届高考英语二轮复习精品课件(广东专用)第3模块 阅读理解 专题2 故事记叙型阅读理解
2017届高考英语二轮复习精品课件(广东专用)第6模块 读写任务 专题4 议论文型读写任务
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题4 动词与动词短语
2017届高考英语二轮复习精品课件(广东专用)第3模块 阅读理解 专题8 科普知识型阅读理解
2017届高考英语二轮复习精品课件(广东专用)第1模块 完形填空 专题2 夹叙夹议型完形填空
2017届高考英语二轮复习精品课件(广东专用)第5模块 基础写作 专题4 议论文型基础写作
【译林湖南版课堂新坐标】2011高考英语一轮复习提能训练:Module 11 Units 1~4(含解析)
2017高考英语二轮专题限时训练10:动词的时态与语态
2017届高考英语二轮复习精品课件(大纲版)第2模块 完形填空 专题2 夹叙夹议型完形填空
2017届英语一轮精品复习导学案:Unit1《School Life》(译林牛津版必修1)
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题7 动词的时态与语态
2017届高考英语二轮复习精品课件(广东专用)第3模块 阅读理解 专题6 史地常识型阅读理解
2017高考英语二轮专题限时训练2:名词
2017届高考英语二轮复习精品课件(广东专用)第1模块 完形填空 专题3 议论文型完形填空
2017届英语一轮精品复习导学案:Unit2《Growing pains》(译林牛津版必修1)
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题8 名词性从句
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题6 情态动词与虚拟语气
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题10 定语从句
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题11 特殊句式
2017届高考英语二轮复习精品课件(大纲版)第1模块 单项填空 专题9 连词与状语从句
2017高考英语二轮专题限时训练12:名词性从句
不限 |
英语教案 |
英语课件 |
英语试题 |
不限 |
不限 |
上册 |
下册 |
不限 |