育路教育网,一站式的学习教育平台

2011同等学力申硕英语每日辅导 2月24日

来源:育路教育网 时间:2011-02-24 08:22:32

在职研究生报考条件测评

      Tracking down cybercriminals (网络罪犯) who steal credit card numbers, transfer money from other people’s accounts, or e-mail viruses around the world takes a knowledge of the technology used to commit the crimes. Instead of using fingerprints or following suspects, government agents painstakingly sort out the mess of numbers and symbols and letters that can lead them back through the computer system to the cybercriminals.
  One such investigation led to the arrest of the man accused of sending the extremely dangerous Melissa virus, a computer virus that destroyed files in computers around the world in the spring of 1999. The agents received help from online service technicians, software experts, and a computer-science student. All helped to trace the complex pathways of the virus back to the telephone line and computer of the man who released it.
  In another case, agents worked for two years to catch a cybercriminal who was, among other offenses, stealing credit card numbers. Agents found him by tracing a path from a computer he broke into to the mobile telephone he had used, which led to his address—and arrest.
  The government agents are also working to block cybercriminals who could cut off power and confuse telephone companies. “Think of the consequences(后果) if the power went out for a week—not in just one town or city but down the whole East Coast,” says Michael Vatis, an FBI agent. From TVs to hospital equipment, all would fail.
  Makaveli and TooShort were arrested for the charges of breaking into computers. They were given probation(假释), required to perform community service, and prevented from having home computers with modems (调制解调器). Punishment for adults can be more severe and usually includes some jail time.Most people use their computers legally. For the few who don’t, however, cyberpolice and better security systems will make it harder for cybercriminals to get away with their crimes.
1. What is the main idea of the passage?
 A. Tracing cybercriminals.
 B. Committing crimes on the Internet.
 C. Computer viruses. examda.com
 D. Computer knowledge and technology.
2. What should be known to catch cybercriminals?
 A. Credit card numbers. examda.com
 B.The technology used to commit the crimes.
 C. Suspects’ fingerprints.
 D. Numbers, letters and suspects.
3. How dangerous was Melissa virus back in 1999?
 A. It destroyed computer files worldwide.
 B. Many agencies were involved in the case.
 C. Technicians, experts, and a student were investigated.
 D. Telephone lines and computers were destroyed.
4. What serious result could a computer virus bring about?
 A. Many telephone companies would go bankrupt.
 B. A city would be thrown into darkness.
 C. Power would be out in almost half of the country for a week.
 D. There would be no more television programs to watch.
5. What can we infer about the process of catching computer criminals?
 A. It could be dangerous. examda.com
 B. It is rather complicated to identify the cybercriminals.
 C. It would cause a huge loss.
 D. They have been punished severely.

    参考答案:1. A 2. B 3. A 4. C 5. B

结束

特别声明:①凡本网注明稿件来源为"原创"的,转载必须注明"稿件来源:育路网",违者将依法追究责任;

②部分稿件来源于网络,如有侵权,请联系我们沟通解决。

阅读全文

一站式择校服务!【免费领取】专业规划&择校方案

*学生姓名 :
*手机号码 :
*意向专业 :
 意向院校 :
*当前学历 :
免费领取 :

评论0

“无需登录,可直接评论...”

用户评论
500字以内
发送
    在职研究生报考条件评测
    相关文章推荐
    同等学力申硕需要考试吗?
    同等学力申硕需要考试吗?

    近些年来,攻读在职研究生已经成为很多人提高自我的重要方法,我们都知道,非全日制研究生与全日制研究生一同考试,入学较难,因而同等学力申硕已经成为多数人的挑眩那么,...

    00评论2021-05-11 09:20:44

    免费咨询

    在线咨询 报考资格测评
    扫码关注
    在职研究生微信公众号二维码

    官方微信公众号

    电话咨询
    联系电话
    010-51264100 15901414202
    微信咨询
    用手机号进行搜索添加微信好友
    15901414202

    张老师

    15901414201

    张老师

    15811207920

    育小路

    一对一免费咨询

    张老师
    返回顶部