職稱英語理工類A級閱讀理解題必備練習

雕龍文庫 分享 時間: 收藏本文

職稱英語理工類A級閱讀理解題必備練習

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

  People tend to think of computers as isolated machines, working away all by themselves. Some do-personal computer without an outside link, like someones hideaway cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.  Hacking, our electronic-age term for computer break-in, is more and more in the news-brainy kids vandalizing university records, even pranking about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll files. A student sends out a virus, a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication the main reason for using computers in the first place.  A to show that a hacker is more dangerous than a thief.  C to demand that a protective computer system should be set up against thieves.  37 The word vandalizing in Line 17 means  B creating.  D updating,  A Hacking is also known as computer break-in.  C Hacking is a widespread concern.  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?  B Shutting down the computer whenever he wishes.  D Spoiling a system for air traffic.  A it will cause fear among the public.  C tough measures are illegal.  【參考答案】36. A37. C38. B39. C40. D

  

主站蜘蛛池模板: 啊灬啊别停灬用力视频啊视频| 旧番拯救精灵森林第四集| 妖精视频在线观看免费| 噗呲噗呲捣出白沫蜜汁| 久久99精品久久久久婷婷| 韩国福利一区二区美女视频 | 91青青国产在线观看免费| 男人插女人免费| 在线视频国产99| 国产日韩一区二区三区在线观看| 亚洲国产日韩a在线播放| 4480私人午夜yy苍苍私人影院| 欧美日韩黄色片| 国产精品无码一本二本三本色 | 中国大陆高清aⅴ毛片| 色一情一乱一伦麻豆| 成人在线手机视频| 免费无码成人AV片在线在线播放| 一个人看www免费高清字幕| 福利视频欧美一区二区三区| 夫妻免费无码V看片| 亚洲精品视频在线观看视频| 91福利免费视频| 欧美人七十二式性视频教程一| 国产永久免费观看的黄网站 | 欧美日韩a级片| 国产激情久久久久影院小草| 久久综合久久精品| 色婷婷激情综合| 少妇极品熟妇人妻| 亚洲第一页综合图片自拍| 西西人体免费视频| 日韩久久精品一区二区三区| 四虎影院2019| aaaa级少妇高潮大片在线观看 | 一进一出动态图| 日本影片和韩国影片网站推荐| 又硬又粗进去好爽免费| 99福利视频导航| 欧洲美女与动zooz| 国产一在线精品一区在线观看|