首页
登录
职称英语
The computer network is a creation of the electronic age. In a computer syst
The computer network is a creation of the electronic age. In a computer syst
游客
2023-10-09
59
管理
问题
The computer network is a creation of the electronic age. In a computer system, a hacker is worse than a thief entering your house. He could go through anyone’s electronic mail or add to, change, distort or delete anything in the information stored in the computer’s memory. He could even take control of the entire system by inputting his own instructions in the software. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lighting speed, jamming the entire network—thousands of commercial and government computer systems. Now exists the possibility of terrorism by computer. Destroying a system responsible for air-traffic control at a busy airport or the telephones of a major city is a relatively easy way to spread alarm.
Yet neither business nor government has done enough to strengthen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication—the main reason for using computers in the first place.
选项
A、To show that a hacker is more dangerous than a thief.
B、To tell people that thieves like to steal computers nowadays.
C、To demand that a computer network should be set up against thieves.
D、To look into the case where hackers and thieves are the same people.
答案
A
解析
根据第一段中的:In a computer system,a hacker is worse than a thief entering your house.
转载请注明原文地址:https://www.tihaiku.com/zcyy/3084552.html
相关试题推荐
Whatisthenewsabout?[br][originaltext]Asyouusecomputers,asyou’resurf
Whatisthenewsabout?[br][originaltext]Asyouusecomputers,asyou’resurf
Somepeoplesaythatcomputersaremakingtheworldlonelyanddehumanized.
Incomputerprogramming,thismodelisobviously________anyoftheotherswehav
ScientistsintheUnitedStateshavedevelopedacomputerprogramthatthey
ScientistsintheUnitedStateshavedevelopedacomputerprogramthatthey
ScientistsintheUnitedStateshavedevelopedacomputerprogramthatthey
ScientistsintheUnitedStateshavedevelopedacomputerprogramthatthey
Jackwasso____thecomputergamethathedidn’tnoticemyarrival.A、gratefult
Tinypeoplemightbelivinginsideofyourcomputer—eating,sleeping,andgo
随机试题
Recentresearchfromanimalbehavioristssuggeststhat"asthecrowflies"sh
CaliforniaGovernorvisitedChinato______.[originaltext]CaliforniaGovernor
ScientistsdiscoveredthegeneticsecretoftheBlackDeathby[originaltext]
Mostpeoplewouldbe【C1】______bythehighqualityofmedicine【C2】______to
以头痛为表现的癫痫发作,首先应进行哪项检查A、脑电图 B、脑血流图 C、头颅
卫分证的主要病机是A.温邪犯表,肺卫失宣 B.邪热壅肺,肺气郁闭 C.热灼营
企业安全生产应急管理是对突发事件实施综合性、全过程的一种管理模式。为对突发事件采
节流装置测量液体流量时,取压口的位置是( )。A.在管道的下半部与管道水平中心
按现行会计制度及有关规定,下列会计报表中属于静态会计报表的是()。 A
A.右旋糖酐铁 B.维生素C C.右旋糖酐 D.甲酰四氢叶酸钙 E.叶酸
最新回复
(
0
)