Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
上名牌大学毕业真的能赚的更多?
万万没想到:这些语言的祖先都是英语!
欧盟裁定苹果补缴130亿欧税款
为什么中国人喜欢去宜家睡觉
移动支付崛起威胁中国商业银行获取大数据的能力
郭广昌 P2P基本上都是骗局
中了这8条?那你友谊的小船要翻了
CNN评出世界最好吃7种甜点你吃过几种?
人的一生有具体多长时间?要消耗多少东西?
世界真的需要更多的大学吗
六大方法让你一分钟内拥有好气色
英国厨师小哥挑战世界最辣料理 2分钟他聋了
男票男票速来学习,博得女孩芳心的10大窍门
女性最佳抗老化食物
网络口水战 战火蔓延到现实世界
第一次约会时,男生们想问但却没有问的问题
报告称大自然2016年的资源预算已用完
分手的八大好处
科学家发现基因决定人们对咖啡的需求
如何打开一位害羞同事的心?
苹果党辣么喜欢撩拨Siri,可TA为啥叫Siri?
减肥不是意志活而是技术活,做到这5条就行
今年教师节要对老师说什么?寄语大集锦
会双语的人更具吸引力 事业爱情双丰收
没有颜值又如何?同样能有精彩的活法
面试前做好10件小事,让你临场信心百倍
看脸的时代:老师颜值越高学生效率越高
你是不是爱错人了?看看这12个迹象你占几条
人们为什么辞职?
历年G20峰会主要成果
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |