首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Narrator Listen to part of a lecture in a computer science class. Now get ready to answer the questions. You may use your notes
Narrator Listen to part of a lecture in a computer science class. Now get ready to answer the questions. You may use your notes
admin
2013-08-12
27
问题
Narrator
Listen to part of a lecture in a computer science class.
Now get ready to answer the questions. You may use your notes to help you answer.
What has created opportunities for computer crimes?
Listen to part of a lecture in a computer science class.
Professor
All right, why don’t we get started here...how many of you own and can operate a computer? ... Two, four, six..., let’s see...nineteen; hmm, that’s quite a few of you. OK, well, we all know how popular...no, not just popular...how necessary business and family computers are becoming and how much a part of modern-day life they are now; and so today, I am going to talk about computers. But actually, I don’t intend to talk about the function and operation of computers, but about a problem that is both worrying and very dangerous: computer crime. Let’s look more closely at this modern crime.
One thing is certain; Computers and especially computer networks have created opportunities for crime that never existed before, and as a result, the police and justice departments are becoming increasingly concerned about the growing number of computer users who are gaining access to private or secret information. It’s a problem that is on the rise worldwide. Statistics are showing a trend toward more computer crimes every year.
As we all know, the information that passes through computer networks can be sensitive and dangerous if the wrong people get access to it. War Games, a 1980’s movie, illustrates this point very well. In War Games, a young, high school boy gains access to the United States’ computerized military defense system with the intention of playing a game, but ends up nearly starting a nuclear war. This theme is, of course, exaggerated...it is very unlikely that any one, much less a high school boy, could penetrate the U. S. military security system, which limits access to extremely sensitive networks within the government.
But the idea behind the movie is a disturbing one. People can and, in fact, are using their experience in operating computers to break into networks... and are causing a lot of inconveniences and, even worse, are committing crimes and exposing others to danger. The point is this: Computer crime is very real and dangerous.
Computer crime is tempting for two reasons: number one, some computer geniuses have trouble resisting the challenge. They just want to see if they can do it. And number two, computer crime sometimes has some very significant rewards.
Now get ready to answer the questions. You may use your notes to help you answer.
23. What is the talk mainly about?
Listen again to part of the lecture. Then answer the question.
Professor
All right, why don’t we get started here...how many of you own and can operate a computer? ... Two, four, six... let’s see... nineteen; hmm, that’s quite a few of you. OK, well, we all know how popular...no, not just popular...how necessary business and family computers are becoming and how much a part of modern-day life they are now....
24. Why does the professor say this?
Professor
All right, why don’t we get started here...how many of you own and can operate a computer?
25. What has created opportunities for computer crimes?
26. What kinds of computer users are police becoming increasingly concerned about?
27. Why does the professor mention the movie War Games?
28. According to the talk, what can NOT be concluded?
选项
A、The increased production of computers.
B、The skillful operation of computers.
C、The increasing number of people using computers.
D、The availability of computer networks.
答案
D
解析
本题为细节题,要求考生抓住讲座的细节或事实。如考生听到“computers andespecially computer networks have created opportunities for crime that never existed before(电脑,尤其是电脑网络,为过去从未有过的电脑犯罪创造了机会)”,则可知D项为正确答案。
转载请注明原文地址:https://jikaoti.com/ti/05hYFFFM
0
托福(TOEFL)
相关试题推荐
Completetheformbelow.WriteNOMORETHANONEWORDAND/ORANUMBERforeachanswer.HotelArbitrageBookingFormBooki
Thelecturersaysthatanessayislike______toaspecificquestion.Lookatdivorcestatistics.
Thelecturersaysthatanessayislike______toaspecificquestion.【36】
Thelecturersaysthatanessayislike______toaspecificquestion.【35】
Thelecturersaysthatanessayislike______toaspecificquestion.【34】
Questions13-15WhichTHREEofthefollowingstatementsaretrue?Writetheappropriatelettersonyouranswersheetinanyorde
CompletetheCounsellor’snotes.UseNOMORETHANTHREEWORDSforeachanswer.
CompletetheCounsellor’snotes.UseNOMORETHANTHREEWORDSforeachanswer.
随机试题
上消化道是指()
某商业中心地上4层、地下1层,建筑高度为20m,耐火等级一级,每层层高均为5m,每层建筑面积均为10000m2,按有关国家工程建设消防技术标准配置了自动喷水灭火系统、火灾自动报警系统等消防设施及器材。某歌舞厅位于该商业中心的地下一层至地上四层,每
金融衍生工具的基本特征是()。Ⅰ.跨期性Ⅱ.杠杆性Ⅲ.联动性Ⅳ.高风险性
根据贷款用途的不同,()可以分为个人经营专项贷款和个人经营流动资金贷款。
2007年7月5日,甲授权乙以甲的名义将甲的一台笔记本电脑出售,价格不得低于8000元。乙谎称该电脑属于自己,以6000元的市场价将电脑卖给了不知情的丙并交付。根据合同法律制度的规定,下列说法中,不正确的有()。
行政处罚是指行政机关依法对违反行政管理秩序的公民、法人或其他组织给予制裁的行政行为。据此,下列属于行政处罚的是:
设总体X服从标准正态分布,(X1,X2,…,Xn)为总体的简单样本,则().
有以下程序:#include<stdio.h>main(){inti,j,k,a=5,b=6;i=(a==b)?++a:--b;j=a++;k=b;printf("%d,%d,%d\n",i,j,k);}程序的运行结果是()。
Everyoneofuslivesandworksonasmallpartoftheearth’ssurface,movesinasmallcircle,andoftheseacquaintanceskno
Weshowldn’tdothatdangerousexperiment______theteacheriswithus.
最新回复
(
0
)