亚洲欧洲国产欧美一区精品,激情五月亚洲色五月,最新精品国偷自产在线婷婷,欧美婷婷丁香五月天社区

      自考

      各地資訊
      當(dāng)前位置:考試網(wǎng) >> 自學(xué)考試 >> 自考真題 >> 經(jīng)濟(jì)類 >> 電子商務(wù)英語 >> 文章內(nèi)容

      排行熱點(diǎn)

      • 歷年真題
      • 模擬試題
      • 自考自答

      全國2011年10月高等教育自學(xué)考試電子商務(wù)英語試題_第5頁

      來源:考試網(wǎng) [ 2012年9月11日 ] 【大 中 小】

      Passage 3

      The advent of computers has brought with it a new set of opportunities for mischief (危害) and crime. Today, computers are easy to come by and many people know how computer technology works. More importantly, the growing use of computer networks can multiply a breach (破壞) of security, making larger numbers of people more vulnerable(脆弱的) than would be the case if they were using single, stand-alone computers.

      What’s more, computer experts agree that despite recent widespread publicity-

      computer viruses(病毒) are only one of many computer security problems facing the nation.

      The U.S. Defense Advanced Research Project Agency has requested that the Research Council’s(委員會(huì)) Computer Science and Technology Board assess(評(píng)定) the security problems posed by computer technology, see what solutions may already exist, review research efforts aimed at avoiding security problem in the future, and evaluate existing policies relevant to computer security. The study committee will examine the issue of security for a broad spectrum of users, including the business, national security, and academic communities, as well as the general public.

      David D.Clark, senior research scientist, Laboratory for Computer Science, Massachusetts Institute of Technology, will chair the committee of experts in electronic security, net work security, computer law, software engineering, cryptography(密碼編制), and operating systems. The committee will also include computer users from the defense and banking industries.

      37. Which of the following is most likely to be agreed by computer experts?

      A. Computers are easily available.

      B. There are many kinds of computer security problems.

      C. Computer viruses are the only problem facing the computer network.

      D. The growing use of computer networks can multiply a breach of security.

      38. The phrase “a broad spectrum” in Para.3 probably means _______.

      A. a wide range                        B. a continuous range

      C. a set of hands of colored light     D. a range of various kinds of waves

      39. The Research Council’s Computer Science and Technology Board aims to _______.

      A. consider research efforts to keep away from security problems in the future

      B. assess the security problems put forward by computer technology

      C. evaluate policies for computer security

      D. do all of the above

      40. What is the title of the passage?

      A. Computer Users.                     B. Computer Viruses.

      C. Computer Security.                  D. Computer Networks.

      責(zé)編:dengting