首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
admin
2015-04-17
43
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust.It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory.He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems.To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters.A potential for disaster is building; A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files.A student sends out a "virus" , a secret and destructive command, over a national network.The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer.Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic.Yet neither business nor government has done enough to toughen its defenses against attack.For one thing, such defenses are expensive; for another, they may interrupt communication—the main reason for using computers in the first place.
One of the reasons why business or government has not taken tough measures to stop hacking is that ______
选项
A、it will cause fear among the public
B、hacking has not caused much damage
C、tough measures are illegal
D、communication may be interrupted
答案
D
解析
此题问为何很多公司或政府机构没有采取严厉的措施制止黑客行为。短文最后一段提到“such defenses are expensive;for another,they may interrupt communication”,故选D。
转载请注明原文地址:https://jikaoti.com/ti/akNsFFFM
本试题收录于:
职称英语综合类B级题库职称英语分类
0
职称英语综合类B级
职称英语
相关试题推荐
EnvironmentalProtectionThedestructionofournaturalresourcesandcontaminationofourfoodsupplycontinuetooccur,la
A.alotofmoneyB.nationalpeopleC.morningD.localpeopleE.nationalissuesF.localissuesManyloc
VirtualDriverDrivinginvolvessharpeyesandkeenears,analyzingwithabrain,andcoordinationbetweenhands,feetandb
ElectromagneticEnergyWhitelightseemstobeacombinationofallcolors.Theenergythatcomesfromasourceoflightis
Whichofthefollowingtitlesismostappropriatetothepassage?TheFrenchgeophysicists’studyisdifferentfromcurrently
Asmallnumberoffirmshavestoppedtrading.
Iproposethatwediscussthisatthenextmeeting.
Babiescanlearnlanguageevenintheirsleep.Thestudyshowsthattheinfant’scerebralcortexisworkingwhileheisasleep.
Smokingisnotpermittedintheoffice.
Howlongdidtheauthorwanderaboutinthestreetsbeforehestoppedunderabridge?Theretiredarmyofficersgavehimmoney
随机试题
在紧急情况下,某人先后接受过A型和B型供血者的少量供血,均未出现凝集反应,该人的血型最可能是()。
硬脑膜外血肿晚期瞳孔的变化是()。
患者,女,27岁。便秘2年,近半月来大便时肛门疼痛,粪便表面及便纸上附有鲜血。其诊断最可能是
甲与乙系夫妻关系,四年前乙下落不明,甲提起离婚之诉。对于该起诉,法院应如何处理?()
下列情况中,不影响劳动合同履行的有()。
根据历史数据研究,剩余额与总资产之比小于()时,对商业银行的流动性风险是一个预警。
根据《非上市公众公司监督管理办法》的规定,下列有关非上市公众公司强制信息披露的表述中,正确的有()。
注册会计师应当从以下方面了解被审计单位的性质()。
设f(x)=求f(x)的极值.
网络管理系统的实现方式有(10)。
最新回复
(
0
)