试题来源:职称英语模拟题-理工类-阅读理解
Hacking
people tend to think ofcomputers as isolated machines,working away all by themselves.some do-personalcomputer without an outside link,like someone's hideaway (隐蔽的) cabin in thewoods.but just as most of homes are tied to a community by streets,bus routesand electric lines,computers that exchange intelligence are part of a communitym local,national and even global network joined by telephone connections.
the computer network is acreation of the electric age,but it is based on old-fashioned trust.it cannotwork without trust.a rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.he could go throughanyone's electronic mail or add to,change,distort or delete anything in theinformation stored in the computer's memory.he could even take control of theentire system by placing his own instructions in the software that runs it.hecould shut the computer down whenever he wished,and no one could stop him.thenhe could program the computer to erase any sign of his ever having been there.
hacking,our electronic-age termfor computer break-in,is more and more in the news-brainy kids vandalizinguniversity records,even pranking (胡闹) about insupposedly safeguarded systems.to those who understand how computer networksare increasingly regulating life in the late 20th century,these are notlaughing matters.a potential for disaster is building: a dissatisfied formerinsurance-company employee wipes out information from payroll (工资表) files.a student sends out a "virus",a secret anddestructive command,over a national network.the virus copies itself atlightning speed,jamming the entire network —— thousandsof academic,commercial and government computer systems.such disastrous caseshave already occurred.now exists the possibility of terrorism bycomputer.spoiling a system responsible for air-traffic control at a busyairport,or knocking out the telephones of a major city,is a relatively easy wayto spread panic.yet neither business nor government has done enough to toughenits defenses against attack.for one thing,such defenses are expensive; foranother,they may interrupt communication ——the mainreason for using computers in the first place.
练习:
1.the writer mentions"A.thief" in the seconD.paragraph
A.to show that A.hacker is moredangerous than A.thief.
B.to tell people that thieveslike to steal computers nowadays.
C.to demanD.that A.protectivecomputer system shoulD.be set up against thieves.
D.to demonstrate that hackersanD.thieves are the same people.
2.theworD."vandalizing" in line 17 means
A."stealing".
B."creating".
C."destroying",
D."updating",
3.according to the passage,which of the following statements is not true?
A.hacking is also known ascomputer break-in.
B.experts on computer networksconsider hacking nothing serious.
C.hacking isA.widespreaD.concern.
D.hacking is potentiallydisastrous.
4.which of the following is notmentioneD.in the passage as an instance of attack by A.hacker?
A.deleting information in thecomputer's memory.
B.shutting down the computerwhenever he wishes.
C.entering your house to steal.
D.spoiling A.system for airtraffic.
5.one of the reasons whybusiness or government has not taken tough measures to stop hacking is that
A.it will cause fear among thepublic.
B.hacking has not causeD.muchdamage.
C.tough measures are illegal.
D.communication may beinterrupted.
试题出处:http://www.examtiku.com/shiti/167925517.html
网考网参考答案:A、C、B、C、D
网考网解析:进入考试题库查看解析
大数据分析:根据网考网与考试题库的统计分析,该试题:
17%的考友选择了A选项
47%的考友选择了B选项
27%的考友选择了C选项
9%的考友选择了D选项
考友解析与评论:
· 没读清题就选了,多么简单的一题啊
· 审题不仔细
· 这个答案肯定不对
发布评论 查看全部评论