阅读理解It began as a game: high school and college students studying puter technology figured out they could use personal puters to break into telephone pany puters and make free, long-distance telephone calls. These young puter gifts soon gained the nickname hackers (黑客). Police arrested a few hackers, but many went on to even more plex hacking. One hacker was arrested for making illegal telephone calls and later used a prison phone to change a police officer's credit records to get back at (报复) the officer for arresting him. The hacker also used a puter to change his college records to give himself better grades. As hackers gained experience, they began invading puters at banks, airlines and other businesses. In one plan, a hacker instructed an airline's puter to give him free airplane tickets. The U.S. government is worried hackers may break into its plex networks of defense puters. The government's classified secrets are vulnerable (脆弱的) because thousands of government puters are connected by telephone lines that hackers can tap into. In November 1988, a college student tapped into a non-classified U.S. Defense Department puter network called Arpanet. The hacker injected (输入,注入) a puter program that left copies of itself throughout Arpanet. Some hackers use each virus to destroy all the data in a puter. But in this case, government officials shut down the network before the program reached every puter in the system. Shutting down the system angered many researchers who were using the puters. The hacker turned himself in (自首) to police and told them how to get his program out of the puter system. He was charged with a crime. The incident attracted puter hacking in the United States. Many panies have hired experts to protect their puters from hackers, and many puter experts now advise panies on how to protect their puters. The U.S. government believes foreign governments have hired hackers to try to break into top-secret defense puters. It fears a hacker could inject a virus into military puters that would clean up all the data during a war. Experts disagree over whether a puter network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U.S. will be working to ruin the efforts of puter hackers and spies.1.The main idea of the article is that _______________. A.puter hackers only want to make free long-distance phone callsB.the government wants to hire puter hackers to spy on the RussiansC.puter hackers are a danger to private panies and government secretsD.many panies have hired experts to protect their puters from hackers carrying viruses2.A puter virus is like a human virus because it _______________. A.makes a puter cough and throw upB.spreads from one puter to anotherC.can clean up a person's doctor billsD.requires regular visits to a doctor3.A hacker can be dangerous because ________________. A.he knows how to make free long-distance telephone callsB.information is stored in puters, and a hacker knows how to destroy the informationC.once in prison, he can use a telephone to operate his puterD.a hacker who steals a free airplane ticket might take a doctor of that seat on the airplane4.U.S.government puters are vulnerable to a hacker because _____________. A.the government always pays its telephone bills on timeB.the Russians know what's in the U.S.putersC.viruses attack only government putersD.many government puters are connected by telephone lines5.In the future ________________. A.some most brilliant minds in America will be working to stop puter hackers and spiesB.hackers will begin invading puters at banks, airlines and other businessesC.many puter hackers will be arrested for making free telephone callsD.some puter hackers will turn themselves in to the police
网友回答
CBBDA解析