Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
2014考研英语阅读理解之推理题方法指导
考研英语阅读指导是因祸得福吗
2014考研英语的阅读习题及答案5
2014年考研英语的模拟阅读九
考研英语阅读指导比声音还快
考研英语阅读理解的专项练习007
2014年考研英语的阅读习题及答案1
2014考研英语的阅读习题及答案4
2014年考研英语的模拟阅读四
考研英语阅读理解的专项练习013
2014年考研英语的模拟阅读六
莫让考研英语阅读理解迷了眼
根据马斯洛式指标制定考研英语阅读攻略2
考研英语阅读命题的特点和解题思路评述3
2014考研英语大纲解析传统阅读无实质变化
考研英语阅读理解的专项练习011
2014年考研英语的模拟阅读五
2014年考研阅读的理解答题技巧
考研英语的阅读理解专项练习006
考研英语的阅读指导您要买什么
考研英语阅读指导大火之后
根据按马斯洛式指标制定考研英语阅读攻略1
考研英语阅读理解的专项练习001
考研英语的阅读理解精读100篇高分版TEXT15
考研英语阅读理解的专项练习009
考研英语的阅读理解精读100篇高分版TEXT18
考研英语阅读指导触电的蛇
考研英语阅读命题的特点和解题思路评述2
2014年考研英语的阅读理解复习计划
2014年考研英语的模拟阅读三
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |