Every day, hundreds of thousands of us visit coffee shops. While we drink our coffee, we

Every day, hundreds of thousands of us visit coffee shops. While we drink our coffee, we may connect our smartphone to the shop’s Wi-Fi network, and keep in touch with friends via services such as Facebook.

As well as socializing, we may use the time and free access to a wireless connection to get on top of our finances. Transferring money from your account to others’ accounts is nothing more than a few taps on your screen.

But what coffee drinkers do not realize is that lurking(潜伏) among their fellow coffee-lovers are bank robbers.

Unbeknown to you, this modern form of bank robber is silently collecting all your private data. The only sign of his thievery is perhaps a little smile as your bank log-in details appear on his screen.

You’ll only realize when you later go to a cash machine to withdraw(提取)some money, and discover that every penny in your account has been cleared out.

The common method for thieves is to use your smartphone’s Wi-Fi connection. They rely on the fact that most of us are not careful about the security of networks we connect to.

For example, when you are in a coffee shop, your smartphone will present you with a list of available Wi-Fi networks that you can use to connect your phone to the Internet. Most of these networks are run by legitimate(合法的)companies, but sometimes they are actually created by a thief sitting nearby with little more than a laptop.

These networks are often given names, such as “Free Public Wi-Fi”, which deceive smartphone users into logging in. On the surface, everything seems normal, and you will be able to connect just as you are with a legitimate Wi-Fi service.

However, because you have connected to a network controlled by a thief, he can monitor everything you do, enabling him to collect passwords and log-in details about your bank account.

21.The underlined phrase “get on top of” can be replaced by____________ .

       A.handle                        B.give up                  C.cut off                      D.set up

22.What can we learn from the passage?

       A.Transferring money from your account to others’ is a complex process.

       B.It’s easy for you to tell bank robbers from other coffee drinkers.

       C.Online thieves could steal money because people pay little attention to the security of networks.

       D.All the available networks in a coffee shop are illegal.

23.What’s the author’s attitude towards Wi-Fi traps?

       A.Positive.                      B.Negative.               C.Objective.                D.Indifferent.

24.What’s the best title of this passage?

       A.Be cautious about free Wi-Fi networks.       B.The thief who withdraws our money.

       C.The convenience of free Wi-Fi networks.    D.The process of stealing money.

答案

ACCA

相关题目

下列溶液中的Cl-浓度与50 mL 1 mol·L-1MgCl2溶液中的Cl-浓度
下列溶液中的Cl-浓度与50 mL 1 mol·L-1MgCl2溶液中的Cl-浓度相等的是: A.150 mL 1 mol·L-1NaCl溶液 B.75 mL 2 mol·L-1 CaCl2溶液 C.150 mL 2 mol·L-1KCl溶液 D.
下列有关实验观察的做法,正确的是(  ) A;某同学在观察
下列有关实验观察的做法,正确的是(  ) A;某同学在观察洋葱表皮细胞时,为指给其他同学看清晰的图像,轻轻挪动显微镜。 B:制作人口腔上皮细胞
一个实验用的电动机与电流表串联后接在6伏直流稳压电源上
一个实验用的电动机与电流表串联后接在6伏直流稳压电源上。闭合开关后电动机并没转动,这时电流表的读数为5安,检查发现电动机轴上的齿轮被卡住
You have waited 45 minutes for the valuable 10 minutes’ break. But when the b
You have waited 45 minutes for the valuable 10 minutes’ break. But when the bell for the next class rings, you can’t believe how quickly time has passed. If you have this experience, you’ll k
某醇是人体必需的生物活性物质,分子式为C23H42O。与酸反应
某醇是人体必需的生物活性物质,分子式为C23H42O。与酸反应生成的一种酯的 分子式为C31H56O2。生成这种酯的酸是(     ) A.C6H5CH2COOH           
下列说法有误的一项是(     ) A.《诗经》是我国最早的
下列说法有误的一项是(     ) A.《诗经》是我国最早的一部诗歌总集,收录了西周初年到春秋时期五百多年间产生的诗歌作品305篇,当时统称为“
税收区别于其他财政收入的主要标志是(    )         
税收区别于其他财政收入的主要标志是(    )                                  A.税收是国家凭借政治权力征收的         B.税
函数y=中自变量x的取值范围是( ) A.且   B.        
函数y=中自变量x的取值范围是( ) A.且   B.          C.            D.

最新题目