精品一区二区三区在线播放_羞羞答答视频_国产成人网_久久综合给合久久狠狠狠97色69_亚洲啪啪_国产成人网

職稱英語理工類A級閱讀理解題必備練習

雕龍文庫 分享 時間: 收藏本文

職稱英語理工類A級閱讀理解題必備練習

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

主站蜘蛛池模板: 91久久久久久久 | 成人久久久久久久 | av在线播放网站 | 亚洲电影一区 | 国产视频一区二区在线观看 | 一级黄色片一级黄色片 | 不用播放器的av网站 | 91麻豆精品视频 | 欧美激情视频一区二区三区在线播放 | 日韩毛片免费视频一级特黄 | 天天艹在线 | 玖玖国产精品视频 | 久久av在线 | 黄色网页免费看 | 日本aⅴ免费视频一区二区三区 | 国产一区色 | 正在播放av | 中文字幕av片| 91cn在线观看 | 日韩av网站在线观看 | 成人福利网站 | 成人精品国产 | 久久99久久99 | 日韩精品在线一区 | 欧美精品网站 | 狠狠色综合网 | 国产专区在线 | 欧美aa在线观看 | 老熟妇午夜毛片一区二区三区 | 欧美激情视频一区二区 | 国产精品一区在线 | 欧美精品福利在线 | 久久免费视频观看 | 久久精品国产亚洲一区二区三区 | 中文字幕精品久久久乱码 | 国产精品一区二区三区av | www,久久久| www.99re.| 牛牛影视一区二区三区免费看 | 91久久精品一区二区 | 亚洲88|