Hacking People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections. Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place. A to show that a hacker is more dangerous than a thief. C to demand that a protective computer system should be set up against thieves. 37 The word vandalizing in Line 17 means B creating. D updating, A Hacking is also known as computer break-in. C Hacking is a widespread concern. 39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker? B Shutting down the computer whenever he wishes. D Spoiling a system for air traffic. A it will cause fear among the public. C tough measures are illegal. 【参考答案】36. A37. C38. B39. C40. D
雅思考生阅读考试问题解析
雅思阅读做题技巧全介绍(观点搭配题)
雅思阅读完成句子题的特点及解题步骤
雅思阅读简答题的解题技巧和注意事项
三步五点 学术类雅思阅读的基本解题思路
雅思阅读背景:英国发布100部必读书籍清单
雅思阅读做题技巧全介绍(headings)
雅思阅读材料推荐:多读学术类期刊杂志
雅思阅读做题技巧全介绍(从属关系搭配题)
雅思阅读:教你如何轻松做精明“海淘族”
雅思阅读重点注意词汇
快速完成雅思阅读的方法:不能逐句读
雅思阅读高分提升攻略
雅思阅读材料之恒星的诞生
雅思阅读做题技巧全介绍(其他题型)
雅思阅读材料:剑桥大学介绍
雅思阅读语法作用及复习解析
细数雅思阅读备考五大罪状
雅思阅读8种题型的答题攻略大全
雅思考试阅读中常见的地名词汇
雅思阅读材料:悉尼大学的图书馆借书规则
雅思阅读中的动词不定式讲解
雅思阅读做题技巧全介绍(summary)
九类雅思阅读关键词整理
如何分配雅思阅读考试时间最合理
雅思阅读备考之词汇句子答题
雅思阅读考试高分关键点
雅思阅读解答技巧之因果搭配
细数雅思阅读高分需要注意的小细节
雅思阅读做题技巧全介绍(table completion)
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |