Ⅰ.阅读理解
It began as a game: High school and college students study
ing computer technology figured out they could use personal computers to break into telephone company computers and make free, longdistance telephone calls. These young computer talents soon gained the name “hackers”.
Police arrested a few hackers, but many went on to even more complex hacking. One of them was arrested for making illegal telephone calls and later he used a phone to change a police officer's credit records to get back at the officer for arresting him. He also used a computer to change his college records to give himself better grades.
As hackers gained experience they began invading computers at banks, airlines and other businesses. In one case a hacker instructed an airline's computer to give him free airplane tickets.
The US government is worried that hackers may break into its networks of defense computers. The government's secrets are easily attacked because thousands of government computers are connected by telephone lines that hackers can get into.
In November 1988, a college student entered a US Defense Department computer network called Arpanet. The hacker injected a computer program that made copies of itself throughout Arpanet. Some hackers use viruses to destroy all the data in a computer. But in this case, government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself in to the police and he was charged with a crime.
The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.
The US government believes foreign governments have hired hackers to try to break into topsecret defense computers.
Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most outstanding minds in the US will be working to frustrate the attempts of computer hackers.
本文是一篇说明文,介绍了黑客的起源,以及他们非法侵入各个领域的网络系统的犯罪行为。
1.What did the first hackers do?
A.They broke into government computers. B.They destroyed airplane ticket systems.
C.They played computer games.D.They made free phone calls.
答案:D
解析:考查推理判断。根据第一段“It began as a game:...figured out they could use personal computers to break into telephone company computers and make free, longdistance telephone calls. These young computer talents soon gained the name ‘hackers’.”可知它起初是一个游戏:学习计算机的高中生和大学生发现他们可以使用个人电脑闯入电话公司的电脑并拨打免费的长途电话。这些年轻的计算机人才很快就被称为“黑客”。这说明这些高中生和大学生是第一批黑客,他们拨打了免费的电话。故选D。
2.Why can US government computers be easily hacked into?
A.They have no defense systems.
B.They are connected by telephone lines.
C.They are partly accessible to the public.
D.They lack complex processing programs.
答案:B
解析:考查细节理解。根据第四段中的“The government's secrets are easily attacked because thousands of government computers are connected by telephone lines that hackers can get into.”可知政府的秘密很容易被攻击,因为成千上万的政府计算机通过黑客可以进入的电话线被连接起来。故选B。
3.What happened to the government computers in November 1988?
A.They lost all of the important data.
B.They were shut down by researchers.
C.They were invaded by a college student.
D.They got totally ruined by a computer program.
答案:C
解析:考查细节理解。根据第五段中的“In November 1988, a college student entered a US Defense Department computer network called Arpanet. The hacker injected a computer program that made copies of itself throughout Arpanet.”可知1988年11月,一名大学生进入美国国防部的计算机网络Arpanet并注入了一个计算机程序,这个程序可以通过Arpanet进行自我复制。也就是说,美国政府的电脑被一个大学生入侵了。故选C。
4.What did companies decide to do to protect their computer systems?
A.Employ computer talents. B.Build secret defense systems.
C.Ask the government for help.D.Collect and analyze the data of hackers.
答案:A
解析:考查细节理解。根据倒数第三段中的“Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers. ”可知许多公司聘请了专家来保护他们的计算机免受黑客攻击并且许多计算机专家如今会建议公司如何保护他们的计算机。故选A。