《新标准大学英语综合教程第三单元reading_practise》由会员分享,可在线阅读,更多相关《新标准大学英语综合教程第三单元reading_practise(10页珍藏版)》请在金锄头文库上搜索。
1、The Internet is overwhelmingly a power for good. It provides cheap and easy access every moment of every day to a vast reservoir of information and entertainment and it is transforming the nature of commerce and government. However, with approximately one billion users worldwide accessing almost 75
2、million websites, there is bound to be some offensive, and even illegal, use of the net. There is a dark side to the Internet. It would be naive to deny it. Crime on the net takes many forms including hacking, viruses, fraud and so on. While the Washington State Attorney Generals Office can help pro
3、pose legislation to protect consumers against Internet crime and while we can fight Internet crime through our high-tech unit using the states Consumer Protection Act, when it comes to other types of crimes, our efforts are limited by the offices lack of original criminal jurisdiction .If you are a
4、victim of an Internet crime, we encourage you to contact IC3The Internet Crime Complaint Centera partnership between the Federal Bureau of Investigation and the National White Collar Crime Center .IC3s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the
5、rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations.For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 pr
6、ovides a central referral mechanism for complaints involving Internet related crimes. The IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights matters, computer intrusions , economic espionage , onl
7、ine extortion, international money laundering, identity theft, and a growing list of Internet facilitated crimes.1.Which of the following is NOT true according to the passage?A. The Internet can provide a large amount of information.B. The Internet is controlled by the government.C. There must be so
8、me offensive use of the Internet.D. It is innocent to deny the dark side of the Internet.2.How to describe IC3?A. It equals to the Federal Bureau of Investigation.B. It is a center where you can ask for help if you are a victim of Internet crime.C. It is the combination of the FBI and NW3C.D. It is
9、a center where you can find policeman to help you catch the robbers.3.What is IC3s mission?A. It can accept, develop and refer criminal complaints about the net crime.B. It can keep all the record of the victims of on-line attack.C. It provides professional suggestions for individuals to handle cybe
10、r crime.D. It sets up a special mechanism only for authorities.4.What kind of regulatory agency is NOT mentioned in the passage?A. state agencyB. federal agencyC. rural agencyD. local agency5.What can you conclude from the passage?A. Net crime is not so popular at this moment.B. FBI is a center whic
11、h can deal with the net crime.C. Cyber crime has many forms.D. We can depend on IC3 to fight against all the crimes.Questions 6 to 10 are based on the following passage or dialog.Viruses, in the broadest sense, come in three forms. Virus: This is a code that attaches itself to a program in a compute
12、r and then reproduces itself. It can erase files or lock up a system. Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own. Trojan horse: This is a program that performs malicious actions while pret
13、ending to do something else. It is similar to a virus but does not try to reproduce itself. The first PC virusthe Pakistani Brain virusappeared in 1986. According to virus experts, as many as 200 new viruses are created every month. According to MessageLabs, in 2000 one in every 790 e-mails containe
14、d a virus; in 2001, the figure was one in every 380; and, in 2002, it was one in every 212. In 2002, the top three viruses were Klez.H, Yaha.e and Bugbear. The most prolific virus ever is Klez and MessageLabs estimates that one in every 300 e-mails sent today contains a variation of the Klez virus.
15、However, it is believed that there are around 20,000 different computer viruses in existence, many of them placed on the Internet deliberately to cause confusion or damage. The threat of new, self-propagating viruses is growing. Melissa, ExploreZip and Ska-Happy99 forward themselves by hijacking a computer e-mail program which gives them the potential to attack globally in days. The Melissa virus originated by David Smith in March 1999 and named after one of his favorite strippers is believed to have cost businesses world-wide an estimated $385 million in damage to their systems. It