問題詳情
As computer use becomes more common, the need for security is more important than ever. One of thegreatest security threats in the online world is computer hacking.
Computer hacking is the unauthorized access to a computer or network of computers. Hackers, those peoplewho illegally enter systems, may alter or delete information, steal private information, or spread viruses that candamage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allowcomputers to interact with one another. Protocols are sort of like computer police officers. When a computerconnects to another system, the protocols check to see if the access is valid. The protocols can also determinehow much information can be shared between the two systems. Hackers can manipulate the protocols to getunlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking.This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challengingsystem like a bank or military network. Hackers that do damage to a system by releasing viruses or altering,deleting, or taking information are known as active hackers; they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords are harder forhackers to guess. For even greater security, some online services now use “password-plus” systems. In this case,users first put in a password and then put in a second code that changes after the user accesses the site. Userseither have special cards or devices that show them the new code to use the next time. So if a hacker steals thepassword, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
76 What is considered hacking?
(A) releasing a virus
(B) illegally accessing a computer
(C) stealing private information
(D) all of the above
Computer hacking is the unauthorized access to a computer or network of computers. Hackers, those peoplewho illegally enter systems, may alter or delete information, steal private information, or spread viruses that candamage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allowcomputers to interact with one another. Protocols are sort of like computer police officers. When a computerconnects to another system, the protocols check to see if the access is valid. The protocols can also determinehow much information can be shared between the two systems. Hackers can manipulate the protocols to getunlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking.This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challengingsystem like a bank or military network. Hackers that do damage to a system by releasing viruses or altering,deleting, or taking information are known as active hackers; they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords are harder forhackers to guess. For even greater security, some online services now use “password-plus” systems. In this case,users first put in a password and then put in a second code that changes after the user accesses the site. Userseither have special cards or devices that show them the new code to use the next time. So if a hacker steals thepassword, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
76 What is considered hacking?
(A) releasing a virus
(B) illegally accessing a computer
(C) stealing private information
(D) all of the above
參考答案
無參考答案
內容推薦
- 【題組】75 According to this passage, what would be the key role of the flight attendants?(A) ambassador
- 【題組】74 Which of the following services is NOT offered by the flight attendants?(A) cleaning up after
- 66 Let us speculate who ________(A) our keynote speaker is? (B) are our keynote speaker.(C) our keyn
- 【題組】73 What would be the most important thing that the flight attendants do in case of emergency?(A)
- 65 You’ve lived in California for a long time, _________?(A) aren’t you (B) have you (C) haven’t you
- 64 He looks __________ he were very exhausted from work.(A) as if (B) whether (C) though (D) neverth
- 【題組】72 How can the safety regulations be explained?(A) by serving food with plastic knives(B) by giv
- Flight attendants have the most contact with passengers, so their job is vital. Although most of the
- 58 After a heated debate, Peter and Mary were finally able to ___________ their differences.(A) hold
- 59 John’s academic performance _______ his mother’s expectation.(A) catches up (B) gives away (C) fa
內容推薦
- 68 A(n) ________ number of volunteers showed up in the press conference.(A) surprisingly (B) interes
- 【題組】78 What would be the most proper meaning for “protocols”?(A) a set of rules that control access
- 70 We’d ___________ if you could respond to my recent inquiry promptly.(A) appreciate for (B) be app
- 【題組】79 According to this passage, which would be considered the best way to ensure computer security
- 【題組】80 Which of the following phrases best summarizes the main idea of the passage?(A) hackers and c
- 69 I resented ________ that. She could have been more courteous and sophisticated.(A) her saying (B)
- 阿基師和傅大廚兩人常常在廚藝競賽中爭得你死我活,不僅比食物美味,也比生產產量。假設右圖為阿基師和傅大廚運用相同的資源和技術之下,一個工作天可生產草莓派和起司蛋糕兩種產品的生產可能曲線。請問:下列相
- The National Palace Museum in Taipei is very ___________ . One can take many hours to go through
- 正值蓮霧產季,使得蓮霧供給增加,導致市場價格下跌。而當蓮霧價格愈低時,消費者購買的數量就多。請問:當蓮霧價格下跌時,消費者購買蓮霧的支出會呈現何種變化?(A)消費者的支出一定會增加 (B)消費者的
- While the teacher was explaining the science assignment, a student was waving his hands and actin
- This year's bestselling novel features a sibling ___________ between two brothers. The book
- Banh mi sandwiches are a well-known taste in Vietnam that _____ the traditional local flavors of
- To show his hospitality, he offered his guest a bowl of fruits containing figs, dates, apricots,_
- The Indian Prime Minister has been an active _____ of yoga in an attempt to promote this traditio
- Recently divorced, our neighbor downloaded an app of online dating _____ new and true love. Howev
- The president is said to _____ the international order and violate the global consensus. The legi
- In spite of the fast development of technology, machines should be designed to make people work
- 壓縮機吸氣端過熱度增加是因(A)壓縮機卸載(B)膨脹閥開度太小(C)冷卻水減少(D)膨脹閥感溫筒漏氣。
- 下列哪些是螺旋式冰水主機吐出管溫度過高的可能原因?(A)失油(B)軸承損壞(C)高壓壓力過高(D)過冷度太大。
- 下列哪些是冰水溫度無法下降的原因?(A)負荷過大(B)壓縮機無法卸載(C)冷凝器散熱不良(D)冷媒不足。
- The decade of the 1980s in Taiwan __________ a continued emphasis on a comprehensive view of Eng
- R-22 冰水機系統加壓探漏用之氣體為(A)氧氣(B)氮氣(C)氨氣(D)壓縮乾燥空氣。
- 下列哪些是往復式冰水主機系統運轉必要保護元件?(A)油壓差開關(B)逆相保護電驛(C)防凍開關(D)低壓開關。
- 一般空調冷卻水系統的配管管材,有下列哪幾種?(A)聚氯乙烯塑膠硬管(B)鑄鐵管(C)鍍鋅鐵管(D)不銹鋼管。
- 下列哪些是殼管式冷凝器水側的除垢方法?(A)人工洗刷(B)化學清洗(C)機械清洗(D)增加水流量。