2048根据以下材料,回答题。HackingPeople tend to think of computers as isolated machines,working9501

题目详情
根据以下材料,回答题。 Hacking People tend to think of computers as isolated machines,working away all by themselves.Some do——personal computer without an outside link,like someone’S hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community——local,national and even global network joined by telephone connections. The computer network is a creation of the electric age.but it is based on old—fashioned trust.It cannot work without trust.A rogue loose(为所欲为的无赖)in a computer system called hac-ker(黑客)is worse than a thief entering your house.He could go through anyone’s electronic mail or add to.change,distort or delete anything in the information stored in the computer’s menlory.He could even take control of the entire system by placing his own instructions in the software tl_lat runs it. He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there· Hacking.our electronic—age term for computer break—in,is more and more in the news-brainv kids vandalizing university records,even pranking(胡闹)about in supposedly safeguarded svstems.To those who understand how computer networks are increasingly regulating life in the late 20th century.these are not laughing matters.A potential for disaster is buildin9:A dissatisfied fonner insurance—company employee wipes out information from payroll(工资表)files.A student sends out a“virus",a secret and destructive command,over a national network.The virus copies itself at lightning speed,jamming the entire network——thousands of academic,eommercial and government computer systems.Such disastrous cases have already occurred.Now exists tlle Dossibility of terrorism by computer. Spoiling a system responsible for air—traffic control at a busy airport.or knocking out the telephones of a major city,is a relatively easy way to spread Danic.Yet neitller business nor government has done enough to toughen its defenses against attack.For one thin9.such defenses are expensive;for another,they may interrupt communieation-tlle main reason for using computers in the first place. The writer mentions“a thief”in the second paragraph . 查看材料 A.to show that a hacker is more dangerous than a thief B.to tell people that thieves like to steal computers nowadays C.to demand that a protective computer system should be set up against thieves D.to demonstrate that hackers and thieves are the same people 请帮忙给出正确答案和分析,谢谢!
题目答案
题目解析⬇️小程序搜题更方便
推荐题目
8089补偿式微压计可用来测量相对静压。3858
2800In Dr.Baum’s opinion,a true nature reserve . 查看材9931
5303AT2型一氧化碳测量仪检测隧道内一氧化碳浓度时,在传感器工作电极之间产生的微电流,其大小反映了5265
1239骨外显像剂异常浓聚的因素()A.软组织炎症B.恶性胸腹水C.男性乳房发育D.患者衣物上的金属物品5465
3631四时骨显像包括()A.血流相B.延迟相C.血池相D.断层显像687
5638根据以下材料,回答题。Protection of WildlifeDemands for stronger pmtecti。n for wildlife in B2656
4854用回弹法检测混凝土强度后,计算测区平均值时应从测区的16个回弹值中剔除1个最大值和1个最小值。7532
6210公路隧道施工规范中规定,当隧道施工中含10%以下游离二氧化硅的矿物粉尘时,每立方米空气中不得大8334
2066拱架是模板的依托,其强度不足经常会引起衬砌质量问题。1380
1373喷射混凝土层能把围岩压力传给锚杆、金属网等,使整个支护结构受力不均衡。2856
1600隧道拱顶内壁的绝对下沉量称为拱顶下沉值。966
8875刺破强度是反映土工织物抵抗小面积集中荷载的能力。659
926下列哪项不属于三时骨显像()A.血流相B.血池相C.延迟相D.灌注相7443
1918股骨头缺血坏死主要可由以下哪些情况引起()A.骨折B.长期劳累C.长期大量应用激素D.长期慢性饮8852
9556拱顶下沉量测的仪器主要用球铰式收敛计。2272
最新题库