Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
真题示例解读考研英语阅读技巧一
考研英语阅读篇章发型影响年龄右分最显年轻
考研英语阅读篇章婴儿绑在婚纱上美国新娘引争议
考研英语阅读篇章最强自恋美少年天天被自己帅醒
2015考研英语阅读让标点符号说出答案
考研英语阅读篇章英国餐馆推世界最辣酱
考研英语阅读篇章英国庆祝女王八十八岁生日
考研英语阅读篇章科技设备毁了我们的睡眠
考研英语阅读篇章巴西男子痴迷韩流多次整容变亚洲人
考研英语阅读篇章赛后冒雨捡垃圾日本球迷世界杯获称赞
2015考研英语抓住暑期复习黄金时机
考研英语阅读篇章
考研英语阅读篇章无手机就恐慌
考研英语阅读质的飞跃需要三要点
2015考研英语阅读集中练Whos the Smart Sibling
考研英语阅读篇章波兰女清洁工变身职业模特
2015年考研英语六大技巧解决阅读理解
考研英语阅读篇章巴西学生和美国退休老人练趣味口语
2015考研英语阅读集中练Is Snuppy the Puppy for Real
考研英语阅读篇章三D打印一天内造出二百三十二平米楼房
考研英语阅读篇章世界杯三十二强口号
考研英语阅读篇章莎士比亚等英国名人遗嘱网上公布
2015考研英语阅读集中练Cancer and Staying Fit
考研英语阅读篇章百强女性默克尔蝉联榜首
真题示例解读考研英语阅读技巧四
2015考研英语阅读集中练Making Your Grass Greener
2015考研英语阅读集中练Word on the Street
考研英语阅读篇章湖南农民发明载人旅行箱
真题示例解读考研英语阅读技巧二
2015考研英语阅读集中练A Matter of Sovereignty
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |