首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
自考
It began as a game: high school and college students studying computer technology figured out they could use personal computers
It began as a game: high school and college students studying computer technology figured out they could use personal computers
admin
2013-07-02
40
问题
It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards soon gained the nickname" hackers".
Police put the collar on a few hackers,but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer’s credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades. As hackers gained experience,they began invading computers at banks,airlines and other businesses. In one scheme,a hacker instructed an airline’s computer to give him free airplane tickets.
The U. S. government is worried hackers may break into its sophisticated networks of defense computer. The government’s classified secrets are vulnerable because thousands of government computers are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non classified U. S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case,government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself into police and told them how to get his program out of the computer system. He was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The U. S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U. S. will be working to frustrate the efforts of computer hackers and spies.
U. S. government computers are vulnerable to a hacker because ______. ( )
选项
A、the government always pays its telephone bills on time
B、the Russians know what’s in the U. S. computers
C、viruses attack only government computers
D、many government computers are connected by telephone lines
答案
D
解析
细节题。“美国政府的电脑容易遭受黑客攻击的原因是什么?”D选项“许多政府电脑通过电话线相连”,是正确答案。文中第三段说The government’s classified secrets…tap into。A选项“政府一直按时交纳电话费”,B选项“俄国知道美国电脑里面有什么”,C选项“病毒只攻击政府电脑”,这三个选项文中没有提到。
转载请注明原文地址:https://jikaoti.com/ti/iBVaFFFM
本试题收录于:
英语阅读(一)题库文史类分类
0
英语阅读(一)
文史类
相关试题推荐
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Englishisnowtheinternationallanguageforairlinepilots,scientists,medicalexperts,businessmenandmanyothers.Conseque
Regularinteractionorfamiliarityseemstoincreaseliking;often,thepeopleweinteractwiththemostaresimplythosewhoar
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Beforethe1850’stheUnitedStateshadanumberofsmallcolleges,mostofthemdatingfromcolonialdays.Theyweresmall,chu
Itbeganasagame:highschoolandcollegestudentsstudyingcomputertechnologyfiguredouttheycouldusepersonalcomputers
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
AlbertEinsteinonceattributedthecreativityofafamousscientisttothefactthatheneverwenttoschool,andthereforepre
随机试题
IwishI_____busyyesterday;Icouldhavehelpedyouwiththeproblem.
患者男性,42岁。乙型肝炎病史十余年,近来右上腹不适,腹胀。超声表现右叶缩小,左叶增大,肝被膜不光滑,实质回声增粗增强,欠均匀,肝静脉细窄,走行迂曲,管壁不平整。如果门静脉管腔内充满等至稍强回声栓子,门静脉管壁模糊、显示不良,在栓子内可见不规则,不正常
原发性肝癌不包括下列哪一种
背景资料某城市引水工程,输水管道为长980m、DN3500mm钢管,采用顶管法旌工;工作井尺寸8m×20m,挖深15m,围护结构为Φ800mm钻孔灌注桩,设四道支撑。工作井挖土前,经检测发现三根钻孔灌注桩桩身强度偏低,造成围护结构达不到设计要求。调
对来自非上市企业,以及持有股份12个月以上取得的股息红利收入,法律的规定是()。
建立完善的社会保障制度对促进经济发展和社会稳定,保证社会主义市场经济正常运行和国家长治久安都具有重大意义。社会保障制度的核心内容是()。
根据所给资料,回答下列问题。2012年,A省完成港口货物吞吐量13.3亿吨,同比增长14.2%,其中外贸货物吞吐量2.0亿吨,增长24.5%。港口货物吞吐量中,集装箱吞吐量达878.0万标准集装箱,增长3.1%。2012年末,全省公路里
依法治国是党领导人民治理国家的基本方略,其根本目的在于()
假定有如下事件过程:PrivateSubFormClick()DimxAsInteger,nAsIntegerx=1n=0DoWhilex<28x=x*
YouwillheararadiopresenterinterviewingabusinessmancalledMarkFletcher.Foreachquestion(23-30),markoneletter(A
最新回复
(
0
)