首页
登录
职称英语
The Internet began in the 1960s as a small network of academic and governmen
The Internet began in the 1960s as a small network of academic and governmen
游客
2024-11-01
41
管理
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shop ping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to his home or office. Companies doing business over the Internet need sophisticated security measures to protect credit card, bank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain unauthorized access to the organization’s computer systems and data. [br] The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online networks .
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
细节理解题。根据文章最后一段最后一句中“must control the access to ensure that...”可知作者告诫人们“必须保护网络数据不被外来使用破坏或干扰”,因此,D选项为正确答案。A、B和C选项均未在文中提到。
转载请注明原文地址:https://www.tihaiku.com/zcyy/3827171.html
相关试题推荐
Governmentreports,examinationcompositions,legaldocumentsandmostbusiness
Thenewsismainlyabout_______.[originaltext]TheIndiangovernmentsaysthe
TheInternetbeganinthe1960sasasmallnetworkofacademicandgovernmen
Itisuptothegovernmentto______therightsofindividualcitizens.A、withdraw
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
TheUnitedStatesiswell-knownforitsnetworkofmajorhighwaysdesigned
随机试题
What’sthe________timefortheFlight213A?(depart)departure此题是将动词转为名词。
[audioFiles]audio_ehaz20086_001(20086)[/audioFiles]A、Sheisbusyatthemoment.
扇子的用途很广泛,除了能使人凉快之外,还可用于舞蹈、装饰等。Fansareusedwidely.Apartfromcoolingpeople,t
在施工现场发生创伤性出血时,应根据现场条件,及时正确地采取()止血法等暂时性的止
在行政诉讼中,人民法院审查( ),属于对证据真实性的审查。A.证人与当事人是否存
《中华人民共和国劳动合同法》规定。若非出现法定情形,劳动者解除合同。应当提前(
当投资者对未来的现金流量有着特殊的需求时,可采用积极的投资策略。()
关于增值税进项税额,下列说法中错误的是()。A.小规模纳税人购进货物或者接
某施工企业承建某县城一住宅楼工程,工程造价为2000万,假设增值税可抵扣的进项税
总进度纲要的主要内容包括()。A.项目施工的总体部署 B.总进度规划 C.各
最新回复
(
0
)