It is known to us that computer users are being warned by industry experts to pay attentio

发布时间:2020-08-17 08:04:26

It is known to us that puter users are being warned by industry experts to pay attention to secret codes which could be used to record their conversation.
E-mails, screen savers, and electronic greeting cards can carry a secret code which is able to turn on the puter’s microphone, make a recording, and forward it to someone else without the user’s knowledge.
In fact any attachments (附件) sent to a puter, whether it is a game of Space Invaders, or a moving picture, can possibly be used to spy (窥探).
Experts say people should always think twice about opening attachments because --- although not mon --- bugging (窃听) by puter can and has been done.
Bill Lyons, head of the Internet Security Company Finjan, said, “People in the army have tested this and you can be sure, if people in general are aware of it, then puter hackers (黑客) are aware of it. The frightening thing is that there are tools on the Internet which people, using a simple search method, can find, and which will enable them to attach this dangerous code to simple attachments.”
【小题1】What is the advice given in the passage?A.Use secret codes to record other people’s conversation.B.Be careful when opening an attachment.C.Never open any attachments.D.Never use secret codes.【小题2】What worries the experts is that      .A.nobody seems to believe such thingsB.nobody knows the danger of the codeC.tools can easily be used to tie dangerous codes to e-mailsD.effective ways can never be found to deal with the problem.【小题3】Which of the following is TRUE according to the passage?A.A moving picture cannot be used to spy.B.Electronic greeting cards cannot carry a secret code.C.A secret code is used to destroy the puter system.D.Any attachments sent to a puter may carry a secret code.B 

网友回答

(答案→)B 
解析:本文主要讲了专家提醒打开一个附件的时候,一定要小心。专家担心的是电子邮件中,可以利用工具轻而易举地捆绑危险编码。
【小题1】细节题。根据Experts say people should always think twice about opening attachments because --- although not mon --- bugging (窃听) by puter can and has been done.可知这篇文章给出的建议是当打开一个附件的时候,一定要小心,故选B。
【小题2】细节题。根据E-mails, screen savers, and electronic greeting cards can carry a secret code which is able to turn on the puter’s microphone, make a recording, and forward it to someone else without the user’s knowledge.In fact any attachments (附件) sent to a puter, whether it is a game of Space Invaders, or a moving picture, can possibly be used to spy (窥探).可知令专家担心的是电子邮件中,可以利用工具轻而易举地捆绑危险编码,故选C。
【小题3】细节题。根据The frightening thing is that there are tools on the Internet which people, using a simple search method, can find, and which will enable them to attach this dangerous code to simple attachments.故选D。
以上问题属网友观点,不代表本站立场,仅供参考!