首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
财务会计
共用题干 HackingPeople tend to think of com
共用题干 HackingPeople tend to think of com
天天题库
2019-12-17
27
问题
共用题干Hacking
People tend to think of computers as isolated machines,working away all by themselves.
Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.
The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.
Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place.
选项
The writer mentions“a thief"” in the second paragraph______.A: to show that a hacker is more dangerous than a thiefB: to tell people that thieves like to steal computers nowadaysC: to demand that a protective computer system should be set up against thievesD: to demonstrate that hackers and thieves are the same people
答案
A
解析
本题问作者为什么在第二段提到“a thief”(小偷)? 大家知道,闯入别人家偷东西的人被称为小偷,文章第二段第三句提到,黑客比小偷还厉害,还危险,故选A。 本题问短文第三段中vandalizing的意思。如果考生不认识这个词,可根据后面的叙述猜出该词的意思是“destroying”。 本题问下面的叙述哪个是错误的。第三段第一句将hacking解释为“computer break -in”,故选项A正确,选项C和D的意思下文中也提到了,根据排除法可得出选项 B是错误的,其实,根据常识我们也能判断出选项B是错误的。黑客的危害性已人所共知。 本题是细节题,给出的几个选项中有一项不是黑客攻击的情况。闯入房内偷东西显然不是真正意义上的黑客行为。此题亦可凭常识作出判断。 此题问为何很多公司或政府机构没有采取严厉的措施制止黑客行为。短文最后一段提到“such defenses are expensive ; for another , they may interrupt communication”,故选D。
转载请注明原文地址:https://ti.zuoweng.com/ti/TfHfKKKQ
相关试题推荐
C题干组图形都以垂直的竖线为对称轴,选项中只有C符号这个条件。故选C。
D题干中四个图形,两个纵向的线条较长,两个纵向的线条较短,观察选项,只有D符合要求。
B题干中所有图形都是呈轴对称的平面图形。
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形都是封闭图形,依据这一规律,可以推出第6个小
A这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个图却由2条曲线组成,并在排列上呈现出一
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图形中外图的直边数都大于内图的直边数
C这是一道\"5+1\"题型的图形推理题,规律类别为数量关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图都由2种图形组成,依据这一规律,选
C这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,都是垂直轴对称图形。再考察右
B这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,其中两个小图的外框为折线图,
A题干第一个图形的右上角与A的右上角相似,题干第四个图形的右下角与A的右下角相似,由此确定答案为A。组合方式如下图所示:
随机试题
随着网络通信技术、计算机技术和数据库技术的成熟,办公自动化系统已发展进入到新层次
对卡环连接体的错误描述是 A.连接体将卡环与基托连接成一整体 B.卡环连接体
投资利润率=年利润总额或年平均利润总额/项目总投资×100%
特殊单位客户的实名制要求及核对应当遵循()重于形式的原则。
一般而言,()指的是中央银行通过对市场的干预使汇率变化不得超出官方非公开的汇价上
热证多见
下列关于我国古代作家及其代表作品的说法中,错误的是()。 A.曹丕,三国文学家,代表作《燕歌行》 B.杨炯,初唐四杰之一,代表作《从军行》 C...
要全面描述一般偏态分布资料的分布特征,可采用( )A.均数与标准差B.中位数与四分位间距C.全距与中位数D.均数与变异系数E.采用频数表
下列属于无效合同的有( )。A.一方以欺诈、胁迫的手段订立的合同,且损害了国家利益B.恶意串通,损害国家、集体或者第三人利益C.损害社会公共利益D.违反
下列资产负债表项目中,直接根据总分类账户余额填列的有______。A.应交税费B.资本公积C.实收资本D.短期借款