Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
暨南大学2015上半年商务英语BEC报名时间
烟台大学2013年下半年BEC报名时间
2014下半年剑桥BEC商务英语考试报名时间:浙江师范大学
2014下半年剑桥BEC商务英语考试报名时间:浙江外国语学院
2014下半年剑桥BEC商务英语考试报名时间:燕山大学
2014下半年剑桥BEC商务英语考试报名时间:江南大学
2014下半年剑桥BEC商务英语考试报名时间:北京外交人员服务局
河南科技大学2013年下半年BEC报名时间
烟台大学2013年剑桥商务英语BEC考试报名时间
2014下半年剑桥BEC商务英语考试报名时间:北京大学
浙江大学外国语学院2015上半年商务英语BEC报名时间
吉林大学2015上半年商务英语BEC报名时间
南昌大学2015上半年商务英语BEC报名时间
保定市剑桥英语学校2013年下半年BEC报名时间
中国海洋大学2013年下半年BEC报名时间
哈尔滨商业大学2015上半年商务英语BEC报名时间
2014年下半年剑桥BEC商务英语考试报名时间:浙江大学
2014下半年剑桥BEC商务英语考试报名时间:中国科技大学
哈尔滨工业大学2013年下半年BEC报名时间
2014下半年剑桥BEC商务英语考试报名时间:汕头大学
2014下半年剑桥BEC商务英语考试报名时间:河南科技大学
2014下半年剑桥BEC商务英语考试报名时间:温州大学
2014下半年剑桥BEC商务英语考试报名时间:贵州大学
南昌大学2013年下半年BEC报名时间
2014年下半年剑桥BEC商务英语考试报名时间:上海大学
2014下半年剑桥BEC商务英语考试报名时间:暨南大学
西安外国语大学2015上半年商务英语BEC报名时间
2014下半年剑桥BEC商务英语考试报名时间:山东师范大学
浙江财经大学2015上半年商务英语BEC报名时间
2014下半年剑桥BEC商务英语考试报名时间:对外经济贸易大学
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |