首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
36
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
The main idea of the article is______ ( )
选项
A、computer hackers only want to make free long distance phone calls
B、the government wants to hire computer hackers to spy on the Russians
C、computer hackers are a threat to private companies and government secrets
D、many companies have hired experts to protect their computers from hackers who carry viruses
答案
C
解析
主旨题。“本文的主要内容是什么?”C选项“电脑黑客对私人电脑和政府机密是威胁”,是正确答案。A选项“电脑黑客只想打免费长途电话”;B选项“政府想雇佣电脑黑客监视俄国”;D选项“许多公司雇佣专家来保护电脑,使其不受携带病毒的黑客的进攻”,三个选项都不是全文主旨。
转载请注明原文地址:https://jikaoti.com/ti/GBVaFFFM
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
(63)Learningtogetherisafruitfulsourceofrelationshipbetweenchildrenandparents.Byplayingtogether,parentslearnmor
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
Newtechnologylinkstheworldasneverbefore.Ourplanethasshrunk.It’snowa"globalvillage"wherecountriesareonlysecond
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
物资保管基础资料是物资统计、财务核算、综合分析、信息处理的依据。
下列关于辩护人的权利义务的说法,错误的是:()
公共厕所内新建无障碍隔间面积应不小于()。
“开始”菜单中的“程序”级联菜单包含了一些程序和下一级级联菜单,单击某个程序名.就会启动该程序。()
某企业会计期末固定资产账户借方余额为200万元,累计折旧贷方余额为80万元,固定资产减值准备账户贷方余额为13万元。期末在编制资产负债表时固定资产一栏应填制的数字为( )万元。
中国证监会领导干部离职后()年内,不得到与原工作业务直接相关的机构任职。
下列关于我国各民族分布的说法,正确的是:
在企业价值链中,材料供应、生产加工、成品储运、市场营销、售后服务等活动属于()。
有些家长对学龄前的孩子束手无策,他们自愿参加了当地的一个为期6周的“家长培训”讦划。家长们在参加该项计划前后,要在一份劣行调查表上为孩子评分,以表明孩子到底给他们带来了多少麻烦。家长们报告说,在参加该计划之后他们遇到的麻烦确实比参加之前要少。以下哪项如果为
如果你喝的饮料中含有酒精,心率就会加快。如果你的心率加快,就会觉得兴奋。因此如果你喝的饮料中含有酒精,就会觉得兴奋。以下哪项推理的结构和上述推理最为类似?
最新回复
(
0
)