Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
雅思写作中应避免以下的句子
盘点雅思写作中的组合句
如何运用背景句制胜雅思写作
雅思图表作文写作指导:用词分析
雅思写作多用谚语巧加分
雅思写作高分模板:比较对立事物的优缺点
雅思写作时间如何控制(英)
雅思写作:图表作文的写作辅导(英)
如何提高雅思写作技巧性说明
雅思写作把握选词的准确性从三点下手
雅思写作结尾段常用套句分享
雅思写作考试经典简单句句型实例整理
雅思写作中如何避免答非所问(英)
雅思写作高分模板:命题形式报告文
雅思写作高分模板:对立观点式作文
雅思写作模板:大作文开头怎么写?
雅思写作字数问题的疑惑解答
雅思写作:检查的几个重点问题
雅思写作素材:Agree or disagree模板
雅思写作破7的10个要诀(英)
雅思写作素材:单边支持句型
雅思写作指导:忌讳模板的照搬套用
雅思写作陷阱:偏题的原因分析
雅思写作:论提纲的重要性(英)
雅思写作素材:原因和结果的表达方式
雅思写作:经典转折句型备考素材
雅思写作:提纲的重要性(英)
雅思写作高分切记:如何躲开模板
雅思写作经典开头范文3例
浅谈雅思写作提高的三个必经阶段
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |