新标准大学英语综合教程第三单元reading_practise

上传人:l**** 文档编号:266122182 上传时间:2022-03-14 格式:DOCX 页数:10 大小:134.80KB
返回 下载 相关 举报
新标准大学英语综合教程第三单元reading_practise_第1页
第1页 / 共10页
新标准大学英语综合教程第三单元reading_practise_第2页
第2页 / 共10页
新标准大学英语综合教程第三单元reading_practise_第3页
第3页 / 共10页
新标准大学英语综合教程第三单元reading_practise_第4页
第4页 / 共10页
新标准大学英语综合教程第三单元reading_practise_第5页
第5页 / 共10页
点击查看更多>>
资源描述

《新标准大学英语综合教程第三单元reading_practise》由会员分享,可在线阅读,更多相关《新标准大学英语综合教程第三单元reading_practise(10页珍藏版)》请在金锄头文库上搜索。

1、The Internet is overwhelmingly a power for good. It provides cheap and easy access every moment of every day to a vast reservoir of information and entertainment and it is transforming the nature of commerce and government. However, with approximately one billion users worldwide accessing almost 75

2、million websites, there is bound to be some offensive, and even illegal, use of the net. There is a dark side to the Internet. It would be naive to deny it. Crime on the net takes many forms including hacking, viruses, fraud and so on. While the Washington State Attorney Generals Office can help pro

3、pose legislation to protect consumers against Internet crime and while we can fight Internet crime through our high-tech unit using the states Consumer Protection Act, when it comes to other types of crimes, our efforts are limited by the offices lack of original criminal jurisdiction .If you are a

4、victim of an Internet crime, we encourage you to contact IC3The Internet Crime Complaint Centera partnership between the Federal Bureau of Investigation and the National White Collar Crime Center .IC3s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the

5、rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations.For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 pr

6、ovides a central referral mechanism for complaints involving Internet related crimes. The IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights matters, computer intrusions , economic espionage , onl

7、ine extortion, international money laundering, identity theft, and a growing list of Internet facilitated crimes.1.Which of the following is NOT true according to the passage?A. The Internet can provide a large amount of information.B. The Internet is controlled by the government.C. There must be so

8、me offensive use of the Internet.D. It is innocent to deny the dark side of the Internet.2.How to describe IC3?A. It equals to the Federal Bureau of Investigation.B. It is a center where you can ask for help if you are a victim of Internet crime.C. It is the combination of the FBI and NW3C.D. It is

9、a center where you can find policeman to help you catch the robbers.3.What is IC3s mission?A. It can accept, develop and refer criminal complaints about the net crime.B. It can keep all the record of the victims of on-line attack.C. It provides professional suggestions for individuals to handle cybe

10、r crime.D. It sets up a special mechanism only for authorities.4.What kind of regulatory agency is NOT mentioned in the passage?A. state agencyB. federal agencyC. rural agencyD. local agency5.What can you conclude from the passage?A. Net crime is not so popular at this moment.B. FBI is a center whic

11、h can deal with the net crime.C. Cyber crime has many forms.D. We can depend on IC3 to fight against all the crimes.Questions 6 to 10 are based on the following passage or dialog.Viruses, in the broadest sense, come in three forms. Virus: This is a code that attaches itself to a program in a compute

12、r and then reproduces itself. It can erase files or lock up a system. Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own. Trojan horse: This is a program that performs malicious actions while pret

13、ending to do something else. It is similar to a virus but does not try to reproduce itself. The first PC virusthe Pakistani Brain virusappeared in 1986. According to virus experts, as many as 200 new viruses are created every month. According to MessageLabs, in 2000 one in every 790 e-mails containe

14、d a virus; in 2001, the figure was one in every 380; and, in 2002, it was one in every 212. In 2002, the top three viruses were Klez.H, Yaha.e and Bugbear. The most prolific virus ever is Klez and MessageLabs estimates that one in every 300 e-mails sent today contains a variation of the Klez virus.

15、However, it is believed that there are around 20,000 different computer viruses in existence, many of them placed on the Internet deliberately to cause confusion or damage. The threat of new, self-propagating viruses is growing. Melissa, ExploreZip and Ska-Happy99 forward themselves by hijacking a computer e-mail program which gives them the potential to attack globally in days. The Melissa virus originated by David Smith in March 1999 and named after one of his favorite strippers is believed to have cost businesses world-wide an estimated $385 million in damage to their systems. It

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 办公文档 > 教学/培训

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号