It began as a game: high school and college students studying computer technology figured

It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer wizards (奇才) soon gained the nickname "hackers (黑客)".

Police put the collar on a few hackers, but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a jailhouse phone to alter a police officer's credit records to get back at the officer for arresting him. The hacker also used a computer to alter his college records to give himself better grades.

As hackers gained experience, they began invading (侵入) computers at banks, airlines and other businesses. In one scheme, a hacker instructed an airline's computer to give him free airplane tickets.

The U.S. government is worried hackers may break into its sophisticated (复杂的) networks of defense computers. The government's classified secrets are vulnerable (脆弱的) because thousands of government computers are connected by telephone lines that hackers can tap into.

In November 1988, a college student tapped into a non-classified U.S. Defense Department computer network called Arpanet. The hacker injected a computer program that left copies of itself throughout Arpanet. Some hackers use each "viruses" to destroy all the data in a computer. But in this case, government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself in to police and told them how to get his program out of the computer system. He was charged with a crime.

The incident put the spotlight on  computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.

The U.S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would erase all the data during a war.

Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U.S. will be working to frustrate the efforts of computer hackers and spies.

1The main idea of the article is _____.

       Acomputer hackers only want to make free long-distance phone calls

       Bthe government wants to hire computer hackers to spy on the Russians

       Ccomputer hackers are a threat to private companies and government secrets

       Dmany companies have hired experts to protect their computers from hackers who carry viruses

2A computer "virus" is like a human virus because it _____.

       Amakes a computer cough and throw up

       Bspreads from one computer to other computers

       Ccan erase a person's doctor bills

       Drequires regular visits to a doctor

3U.S. government computers are vulnerable to a hacker because _____.

       Athe government always pays its telephone bills on time

       Bthe Russians know what's in the U.S. computers

       Cviruses attack only government computers

       Dmany government computers are connected by telephone lines

4In the future _____.

       ASome of the most brilliant minds in America will be working to try to stop computer hackers and spies

       Bhackers will begin invading computers at banks, airlines and other businesses

       Cmany computer hackers will be arrested for making free telephone calls

       Dsome computer hackers will turn themselves in to the police

答案

CBDA

相关题目

下图所示的中央机构创立于(    )    A.秦汉时期    B
下图所示的中央机构创立于(    )    A.秦汉时期    B.隋唐时期    C.宋元时期    D.明清时期
对于函数f(x)=x3cos3(x+),下列说法正确的是              
对于函数f(x)=x3cos3(x+),下列说法正确的是                              (    ) A.f(x)是奇函数且在()上递减     B. f(x)是奇函数且
6. 根据题目要求填空: (1)图甲为多用电表的示意图,其中S、
6. 根据题目要求填空: (1)图甲为多用电表的示意图,其中S、K、T为三个可调节的部件,现用此电表测量一阻值约为20  Ω~30  Ω的定值电阻,测量的某
25℃时在五份蒸馏水中分别加入适量的下列物质,所得实验结
25℃时在五份蒸馏水中分别加入适量的下列物质,所得实验结果如下表所示: 加入物质HCl(aq)FeCl3NaOHCH3COONaC2H5OH 溶液的pH341011未测定 水的电离程度α1α2
下列没有语病的一组是A.苏丹政府断然否认了设在荷兰海牙的
下列没有语病的一组是A.苏丹政府断然否认了设在荷兰海牙的国际刑事法院以战争罪向苏丹总统巴希尔提出正式指控。这一事件引起了公众的强烈愤慨。
已知函数f(x)的定义域是x≠0的一切实数,对定义域内的任意x1
已知函数f(x)的定义域是x≠0的一切实数,对定义域内的任意x1、x2,都有f(x1·x2)=f(x1)+f(x2),且当x>1时f(x)>0,f(2)=1,(1)求证:f(x)是偶函数;(2)证明f(
奥地利著名的经济学家熊彼得提出“领地国家”和“税收国
奥地利著名的经济学家熊彼得提出“领地国家”和“税收国家”的概念,其中“领地国家”的特征是:在封建制度下,国王的税收有两个来源:一个是
金属冶炼技术随人类对自然界认识的不断深入而发展。下列
金属冶炼技术随人类对自然界认识的不断深入而发展。下列金属中,常用作还原剂冶炼其他金属的是(    ) A.Ag           B.Cu          

最新题目