職稱英語理工類A級閱讀理解題必備練習

雕龍文庫 分享 時間: 收藏本文

職稱英語理工類A級閱讀理解題必備練習

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

主站蜘蛛池模板: 欧美一级黄色片免费看| 亚洲欧美日韩色| 午夜在线观看视频免费成人 | 奇米影视7777久久精品| 成人国产精品视频| 放荡女同老师和女同学生| 日韩精品专区在线影院重磅| 欧美人与动性行为视频| 在线观看亚洲精品专区| 无码日韩人妻av一区二区三区| 日韩精品无码免费一区二区三区| 欧美乱强伦xxxxx高潮| 欧美性猛交XXXX富婆| 欧美日韩亚洲高清不卡一区二区三区| 2021国产麻豆剧传媒仙踪林| 99久久99久久精品免费观看| av无码精品一区二区三区四区| aⅴ免费在线观看| 88aa四虎影成人精品| 亚洲综合校园春色| 高清国产一级精品毛片基地| 葫芦里不卖药葫芦娃app| 韩国三级黄色片| 美女扒开胸露出奶乳免费视频| 男人强行被开发尿孔漫画| 深爱五月激情网| 最近中文字幕完整视频高清电影| 日韩亚洲欧美综合| 日产乱码免费一卡二卡在线| 小屁孩cao大人免费网站| 国产黄在线观看免费观看不卡| 国产精品边做奶水狂喷小说| 国产成人亚洲精品无码青青草原 | 国产国语videosex| 又大又粗又爽a级毛片免费看 | eeuss影院www天堂免费| 中文天堂最新版www官网在线| а√在线地址最新版| 18美女扒开尿口无遮挡| 高清亚洲综合色成在线播放放| 美女视频内衣脱空一净二净|