首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
财务会计
共用题干 HackingPeople tend to think of com
共用题干 HackingPeople tend to think of com
天天题库
2019-12-17
34
问题
共用题干Hacking
People tend to think of computers as isolated machines,working away all by themselves.
Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.
The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.
Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place.
选项
The writer mentions“a thief"” in the second paragraph______.A: to show that a hacker is more dangerous than a thiefB: to tell people that thieves like to steal computers nowadaysC: to demand that a protective computer system should be set up against thievesD: to demonstrate that hackers and thieves are the same people
答案
A
解析
本题问作者为什么在第二段提到“a thief”(小偷)? 大家知道,闯入别人家偷东西的人被称为小偷,文章第二段第三句提到,黑客比小偷还厉害,还危险,故选A。 本题问短文第三段中vandalizing的意思。如果考生不认识这个词,可根据后面的叙述猜出该词的意思是“destroying”。 本题问下面的叙述哪个是错误的。第三段第一句将hacking解释为“computer break -in”,故选项A正确,选项C和D的意思下文中也提到了,根据排除法可得出选项 B是错误的,其实,根据常识我们也能判断出选项B是错误的。黑客的危害性已人所共知。 本题是细节题,给出的几个选项中有一项不是黑客攻击的情况。闯入房内偷东西显然不是真正意义上的黑客行为。此题亦可凭常识作出判断。 此题问为何很多公司或政府机构没有采取严厉的措施制止黑客行为。短文最后一段提到“such defenses are expensive ; for another , they may interrupt communication”,故选D。
转载请注明原文地址:https://ti.zuoweng.com/ti/TfHfKKKQ
相关试题推荐
C题干组图形都以垂直的竖线为对称轴,选项中只有C符号这个条件。故选C。
D题干中四个图形,两个纵向的线条较长,两个纵向的线条较短,观察选项,只有D符合要求。
B题干中所有图形都是呈轴对称的平面图形。
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形都是封闭图形,依据这一规律,可以推出第6个小
A这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个图却由2条曲线组成,并在排列上呈现出一
D这是一道\"5+1\"题型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图形中外图的直边数都大于内图的直边数
C这是一道\"5+1\"题型的图形推理题,规律类别为数量关系。仔细地比较题干中给出的左边5个图形,不难发现,左边5个图形,每个小图都由2种图形组成,依据这一规律,选
C这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,都是垂直轴对称图形。再考察右
B这是一道“3-3-4\"类型的图形推理题,规律类别为组合关系。仔细地比较题干中给出的两套图形,不难发现,左边的一套图中包含三个图形,其中两个小图的外框为折线图,
A题干第一个图形的右上角与A的右上角相似,题干第四个图形的右下角与A的右下角相似,由此确定答案为A。组合方式如下图所示:
随机试题
(29-30题共用备选答案) A.干姜、茯苓 B.生姜、茯苓 C.半夏、当
初产妇,妊娠37周,宫缩15s/1~2分钟,于宫缩时人工破膜后,产妇烦躁不安,呼
用于评价和诊断0~3岁儿童神经系统发育的完善情况及功能成熟程度的测验为 A、丹
尿中儿茶酚胺升高见于
日本血吸虫虫卵主要引起
下列属于违反治安管理行为特征的是( )A.社会危害性B.行政违法性C.情节轻微性D.应受处罚性
药品的基本特征是A:有效性和均一性B:安全性和均一性C:稳定性和安全性D:稳定性和经济性E:有效性和安全性
“5S”安全管理法是指对生产现场的各种要素进行合理配置和优化组合的动态过程,即整理、整顿、清扫、清洁、素养。“5S”活动的核心是()。A.整理B.整顿C
《中华人民共和国企业所得税法》是由()制定的。A.全国人民代表大会及其常务委员会B.国务院C.地方人民政府D.国务院财税主管部门
下列各项中,会导致被审计单位当期应付职工薪酬虚增的有()A.不计提公费经费B.将研发人员的薪酬计入生产成本C.将离职后福利计入应付职工薪酬D.按照职工工资