Every day, hundreds of thousands of us visit coffee shops. While we drink our coffee, we

Every day, hundreds of thousands of us visit coffee shops. While we drink our coffee, we may connect our smartphone to the shop’s Wi-Fi network, and keep in touch with friends via services such as Facebook.

As well as socializing, we may use the time and free access to a wireless connection to get on top of our finances. Transferring money from your account to others’ accounts is nothing more than a few taps on your screen.

But what coffee drinkers do not realize is that lurking(潜伏) among their fellow coffee-lovers are bank robbers.

Unbeknown to you, this modern form of bank robber is silently collecting all your private data. The only sign of his thievery is perhaps a little smile as your bank log-in details appear on his screen.

You’ll only realize when you later go to a cash machine to withdraw(提取)some money, and discover that every penny in your account has been cleared out.

The common method for thieves is to use your smartphone’s Wi-Fi connection. They rely on the fact that most of us are not careful about the security of networks we connect to.

For example, when you are in a coffee shop, your smartphone will present you with a list of available Wi-Fi networks that you can use to connect your phone to the Internet. Most of these networks are run by legitimate(合法的)companies, but sometimes they are actually created by a thief sitting nearby with little more than a laptop.

These networks are often given names, such as “Free Public Wi-Fi”, which deceive smartphone users into logging in. On the surface, everything seems normal, and you will be able to connect just as you are with a legitimate Wi-Fi service.

However, because you have connected to a network controlled by a thief, he can monitor everything you do, enabling him to collect passwords and log-in details about your bank account.

21.The underlined phrase “get on top of” can be replaced by____________ .

       A.handle                        B.give up                  C.cut off                      D.set up

22.What can we learn from the passage?

       A.Transferring money from your account to others’ is a complex process.

       B.It’s easy for you to tell bank robbers from other coffee drinkers.

       C.Online thieves could steal money because people pay little attention to the security of networks.

       D.All the available networks in a coffee shop are illegal.

23.What’s the author’s attitude towards Wi-Fi traps?

       A.Positive.                      B.Negative.               C.Objective.                D.Indifferent.

24.What’s the best title of this passage?

       A.Be cautious about free Wi-Fi networks.       B.The thief who withdraws our money.

       C.The convenience of free Wi-Fi networks.    D.The process of stealing money.

答案

ACCA

相关题目

【2012•安徽期末】如右图所示,在匀强磁场B中放一电阻不计
【2012•安徽期末】如右图所示,在匀强磁场B中放一电阻不计的平行金属导轨,导轨跟固定的大导体矩形环M相连接,导轨上放一根金属导体棒ab并与导轨
下图是人体心脏结构示意图,据图回答下列问题:(5分)(1
下图是人体心脏结构示意图,据图回答下列问题:(5分)(1)体循环开始于[ ]       ,结束于[ ]          (2)肺循环开始于[ ]         
酸、碱溶液是化学常见的物质,依据所给内容回答问题: 下
酸、碱溶液是化学常见的物质,依据所给内容回答问题: 下表是在不同温度下氢氧化钠的溶解度:  温度/℃020406080100 溶解度/g3191111129313336 (1)氢氧
阅读下面这首唐诗,完成8~9题。 夔州歌十首(其九) 杜甫
阅读下面这首唐诗,完成8~9题。 夔州歌十首(其九) 杜甫 武侯祠堂不可忘,中有松柏参天长。 干戈满地客愁破,云日如火炎天凉。 8.杜甫的这首诗
(本小题满分6分)四条线段,,,如图,(1)选择其中的三
(本小题满分6分)四条线段,,,如图,(1)选择其中的三条线段为边作一个三角形(尺规作图,要求保留作图痕迹,不必写出作法);(2)任取三
若点A与点B分别在直线的两侧,则的取值范围为        .
若点A与点B分别在直线的两侧,则的取值范围为        .
完形填空。      I asked many classmates and friends, “What do you th
完形填空。      I asked many classmates and friends, “What do you think you will be when you grow up?” 1 of them told me what they would like to be in the future,  2  others said,
美国南北战争期间,林肯政府颁布的重要法令是( ) ①《
美国南北战争期间,林肯政府颁布的重要法令是( ) ①《宅地法》  ②《独立宣言》  ③《人权宣言》  ④《解放黑人奴隶宣言》 A.①③       B.

最新题目