首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
Hacking People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer wit
admin
2015-04-17
75
问题
Hacking
People tend to think of computers as isolated machines, working away all by themselves.Some do—personal computer without an outside link, like someone’s hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community—local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust.It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory.He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems.To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters.A potential for disaster is building; A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files.A student sends out a "virus" , a secret and destructive command, over a national network.The virus copies itself at lightning speed, jamming the entire network—thousands of academic, commercial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer.Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic.Yet neither business nor government has done enough to toughen its defenses against attack.For one thing, such defenses are expensive; for another, they may interrupt communication—the main reason for using computers in the first place.
Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?
选项
A、Deleting information in the computer’s memory.
B、Shutting down the computer whenever he wishes.
C、Entering your house to steal.
D、Spoiling a system for air traffic.
答案
C
解析
本题是细节题,给出的几个选项中有一项不是黑客攻击的情况。闯入房内偷东西显然不是真正意义上的黑客行为。此题亦可凭常识作出判断。
转载请注明原文地址:https://www.kaotiyun.com/show/RIUd777K
本试题收录于:
职称英语综合类B级题库职称英语分类
0
职称英语综合类B级
职称英语
相关试题推荐
ComputerandSchoolEducationTherewasatimewhenparentswhowantedaneducationalpresentfortheirchildrenwouldbuya
A.alotofmoneyB.nationalpeopleC.morningD.localpeopleE.nationalissuesF.localissuesManyloc
ComputerandSchoolEducationTherewasatimewhenparentswhowantedaneducationalpresentfortheirchildrenwouldbuya
A.removediseaseB.resistseparatingC.shufflebetweentwomoltenmetaldropletsD.powernanomachinesE.sopupmoleculesfr
FirstPlanetfromtheSunMercury,theplanetnearestthesun,isdifficulttoobservefromtheEarthbecauseitrisesands
DefendingtheTheoryofEvolutionStillSeemsNeededJudithS.Weis,abiologyprofessorwhoservesaspresidentoftheAmer
IntellectualPropertyRightsInformationtechnologyhaspresentedlegislatorsandlawyers—andyou—withsomenewethicalques
Electroniccommunication,duetoitsspeedandbroadcastingability,isfundamentallydifferentfrompaper-basedcommunications
GrossNationalHappinessInthelastcentury,newtechnologyimprovedthelivesofmanypeopleinmanycountries.However,o
A.theyaredirectlyrelatedtoourhealthB.usingsustainablematerialsC.theenvironmentalprotectionD.theworkingconditi
随机试题
参照群体的影响力取决于__________、__________以及__________。
适筋梁与超筋梁破坏的主要区别:前者破坏始于受拉钢筋屈服,后者则始于受压混凝土被压碎。()
下列叙述中,错误的是________________。
拟观察某肠梗阻患者腹部积气和积液情况,最好选用
采集病史时应注意询问接触何种工业毒物对此女工应作如何处理
资产负债表中“应收账款”项目应根据()之和减去“坏账准备”账户中有关应收账款计提的坏账准备期末余额填列。
下列关于我国《反垄断法》的适用范围表述正确的是()。
水果:苹果( )。
1977年2月7日,联合发表社论《学好文件抓住纲》,公开提出“凡是毛主席作出的决策,我们都要坚决拥护,凡是毛主席的指示,我们都要始终不渝地遵循”的错误方针的杂志和报纸不包括()。
设有关系SC(SNO,CNO.GRADE)如下所示。SCSNOCNOGRADE001c190001c265002c180002c290002c38
最新回复
(
0
)