精品一区二区三区在线播放_羞羞答答视频_国产成人网_久久综合给合久久狠狠狠97色69_亚洲啪啪_国产成人网

職稱英語理工類A級閱讀理解題必備練習

雕龍文庫 分享 時間: 收藏本文

職稱英語理工類A級閱讀理解題必備練習

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

主站蜘蛛池模板: 久久午夜精品 | 99久久99九九99九九九 | 在线小视频 | 香蕉av777xxx色综合一区 | 精品国产一二三 | 欧美a在线看 | 成人免费在线观看 | 久久久久久久久久国产精品 | 久久精品国产久精国产 | 国产亚洲高清视频 | 国产成人在线看 | 成人黄色毛片 | 91精品国产高清 | 国产精品视频一区二区三区 | 综合久久久久久久 | 亚洲一区二区三区在线视频 | 久久久久久久久久国产 | 国产精品一区二区久久久 | 欧美日韩一区二区三区不卡 | 亚洲国内精品 | 日韩在线视频观看 | 亚洲一区视频在线 | 久久久亚洲国产精品麻豆综合天堂 | 欧美一区二区精品 | 丰满岳妇乱一区二区三区 | 午夜免费视频 | 精品成人| 亚洲免费网 | 91一区二区三区 | 偷拍视频一区二区 | 91高清版| 欧美久久一区二区 | 免费在线国产 | 色欧美综合 | 精品欧美乱码久久久久久1区2区 | 99久久免费观看 | 欧美极品少妇xxxxⅹ喷水 | 国产精品成人3p一区二区三区 | 国产理论一区二区三区 | 国产首页 | 不卡二区|