单选题:根据下列文章,请回答题。HackingPeople tend to think of computers as isol

  • 题目分类:理工类
  • 题目类型:单选题
  • 查看权限:VIP
题目内容:
根据下列文章,请回答题。HackingPeople tend to think of computers as isolated machines, working away all by themselves. Some do -- personal computer without an outside link, like someone's hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus rootes and electric lines, computers that exchange intelligence are part of a community -- local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house. He could go through anyone's electronic mail or add to, change, distort or delete anything in the information stored in the computer's memory. He could even take control of the entire system by placing his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in, is more and more in the news- brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files. A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network -- thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication -- the main reason for using computers in the first place.The writer mentions "a thief" in the second paragraph A.to show that a hacker is more dangerous than a thie
B.to tell people that thieves like to steal computers nowaday
C.to demand that a protective computer system should be set up against thieve
D.to demonstrate that hackers and thieves are the same peopl
参考答案:
答案解析:

Which of the statements is NOT true according to this passag

Which of the statements is NOT true according to this passage?A.Parents should s

查看答案

We learn from the passage that the writer

We learn from the passage that the writerA.is fed up with the Net opponent B.pre

查看答案

主要功能是储存燃气、加压和向城市燃气管网分配燃气的系统是(  )。

主要功能是储存燃气、加压和向城市燃气管网分配燃气的系统是(  )。A.燃气长距离输送系统 B.燃气调压站(室) C.燃气系统附属设备 D.燃气储配站

查看答案

应用于给水系统最多的一种钢管是(  )。

应用于给水系统最多的一种钢管是(  )。A.中压流体输送用镀锌焊接钢管 B.低压流体输送用无缝钢管 C.低压流体输送用镀锌焊接钢管 D.中压流体输送用无缝钢管

查看答案

隧道施工爆破作业安全技术要点包括(  )。

隧道施工爆破作业安全技术要点包括(  )。 A.洞内爆破必须统一指挥,并由经过专业培训且持有爆破操作合格证的专业人员进行作业 B.装炮时,应使用木质炮棍装药,严

查看答案