首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
财务会计
共用题干 HackingPeople tend to think of com
共用题干 HackingPeople tend to think of com
天天题库
2019-12-17
58
问题
共用题干Hacking
People tend to think of computers as isolated machines,working away all by themselves.
Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.
The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.
Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place.
选项
The writer mentions“a thief"” in the second paragraph______.A: to show that a hacker is more dangerous than a thiefB: to tell people that thieves like to steal computers nowadaysC: to demand that a protective computer system should be set up against thievesD: to demonstrate that hackers and thieves are the same people
答案
A
解析
本题问作者为什么在第二段提到“a thief”(小偷)? 大家知道,闯入别人家偷东西的人被称为小偷,文章第二段第三句提到,黑客比小偷还厉害,还危险,故选A。 本题问短文第三段中vandalizing的意思。如果考生不认识这个词,可根据后面的叙述猜出该词的意思是“destroying”。 本题问下面的叙述哪个是错误的。第三段第一句将hacking解释为“computer break -in”,故选项A正确,选项C和D的意思下文中也提到了,根据排除法可得出选项 B是错误的,其实,根据常识我们也能判断出选项B是错误的。黑客的危害性已人所共知。 本题是细节题,给出的几个选项中有一项不是黑客攻击的情况。闯入房内偷东西显然不是真正意义上的黑客行为。此题亦可凭常识作出判断。 此题问为何很多公司或政府机构没有采取严厉的措施制止黑客行为。短文最后一段提到“such defenses are expensive ; for another , they may interrupt communication”,故选D。
转载请注明原文地址:https://ti.zuoweng.com/ti/TfHfKKKQ
相关试题推荐
C题干组图形都以垂直的竖线为对称轴,选项中只有C符号这个条件。故选C。
D题干中四个图形,两个纵向的线条较长,两个纵向的线条较短,观察选项,只有D符合要求。
B题干中所有图形都是呈轴对称的平面图形。
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形都是封闭图形,依据这一规律,可以推出第6个小
A这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个图却由2条曲线组成,并在排列上呈现出一
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图形中外图的直边数都大于内图的直边数
C这是一道\"5+1\"题型的图形推理题,规律类别为数量关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图都由2种图形组成,依据这一规律,选
C这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,都是垂直轴对称图形。再考察右
B这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,其中两个小图的外框为折线图,
A题干第一个图形的右上角与A的右上角相似,题干第四个图形的右下角与A的右下角相似,由此确定答案为A。组合方式如下图所示:
随机试题
将出版物配发给下游售货商的方式称为()。A、出版物发行B、出版物流通C、出版物分发D、出版物销售C
在建筑设计中,除了临时建筑外,都必须进行抗震设防的最低地震烈度是( )度。
( )不可以开立基金账户。 A.16岁个体小王 B.17岁在读大学
(16-17题共用备选答案) A.近肺底的横行条状致密影 B.尖端指向肺门的
甲、乙、丙拟出资设立A有限责任公司。在筹办公司过程中,甲以自己的名义租赁B公司的
患者,女,26岁,突然发热,一天后出现肉眼血尿,无尿频、尿痛,化验尿常规蛋白(+),红细胞30~40个/HP,白细胞10~20个/HP。为尽早明确诊断,检...
在猩红热患儿的皮疹特点中,下列哪项不正确A:多在发热的第2天出现B:在全身皮肤弥漫性充血潮红的基础上,广泛分布均匀密集的红色细小皮疹C:无脱皮和脱屑D:于
下面的短文后有2项测试任务:(1)第23~26题要求从所给的6个选项中为第1~4段,每段选择1个最佳标题;(2)第27~30题要求从所给的6个选项中为每...
下列各项预算中,不适用弹性预算法编制的是( )。A.资本支出预算B.销售收入预算C.成本费用预算D.材料采购预算
下列各项中,应当作为企业存货核算的有()。A.房地产开发企业为建造自用办公大楼购入土地支付的出让金B.摊销期限不超过一年的确认为资产的合同履约成本C.