2020-2021学年新教材英语人教版选择性必修第一册课时作业8 UNIT 2 LOOKING INTO THE FUTURE DISCOVER USEFUL STRUCTURES WORD版含解析.DOC
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5 0人已下载
| 下载 | 加入VIP,免费下载 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2020-2021学年新教材英语人教版选择性必修第一册课时作业8UNIT LOOKING INTO THE FUTURE DISCOVER USEFUL
- 资源描述:
-
1、.阅读理解 It began as a game: High school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, longdistance telephone calls. These young computer talents soon gained the name “hackers”Police arrested a fe
2、w hackers, but many went on to even more complex hacking. One of them was arrested for making illegal telephone calls and later he used a phone to change a police officers credit records to get back at the officer for arresting him. He also used a computer to change his college records to give himse
3、lf better grades.As hackers gained experience they began invading computers at banks, airlines and other businesses. In one case a hacker instructed an airlines computer to give him free airplane tickets.The US government is worried that hackers may break into its networks of defense computers. The
4、governments secrets are easily attacked because thousands of government computers are connected by telephone lines that hackers can get into. In November 1988, a college student entered a US Defense Department computer network called Arpanet. The hacker injected a computer program that made copies o
5、f itself throughout Arpanet. Some hackers use viruses to destroy all the data in a computer. But in this case, government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacke
6、r turned himself in to the police and he was charged with a crime.The incident put the spotlight on computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.The U
7、S government believes foreign governments have hired hackers to try to break into topsecret defense computers.Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most outstanding minds in the US will be working to frustrate the attempts of c
8、omputer hackers.本文是一篇说明文,介绍了黑客的起源,以及他们非法侵入各个领域的网络系统的犯罪行为。1What did the first hackers do? AThey broke into government computers. BThey destroyed airplane ticket systems.CThey played computer games.DThey made free phone calls.答案:D解析:考查推理判断。根据第一段“It began as a game:.figured out they could use personal
9、computers to break into telephone company computers and make free, longdistance telephone calls. These young computer talents soon gained the name hackers”可知它起初是一个游戏:学习计算机的高中生和大学生发现他们可以使用个人电脑闯入电话公司的电脑并拨打免费的长途电话。这些年轻的计算机人才很快就被称为“黑客”。这说明这些高中生和大学生是第一批黑客,他们拨打了免费的电话。故选D。2Why can US government computers b
10、e easily hacked into? AThey have no defense systems. BThey are connected by telephone lines.CThey are partly accessible to the public.DThey lack complex processing programs.答案:B解析:考查细节理解。根据第四段中的“The governments secrets are easily attacked because thousands of government computers are connected by te
11、lephone lines that hackers can get into.”可知政府的秘密很容易被攻击,因为成千上万的政府计算机通过黑客可以进入的电话线被连接起来。故选B。3What happened to the government computers in November 1988? AThey lost all of the important data.BThey were shut down by researchers.CThey were invaded by a college student.DThey got totally ruined by a compute
12、r program.答案:C解析:考查细节理解。根据第五段中的“In November 1988, a college student entered a US Defense Department computer network called Arpanet. The hacker injected a computer program that made copies of itself throughout Arpanet.”可知1988年11月,一名大学生进入美国国防部的计算机网络Arpanet并注入了一个计算机程序,这个程序可以通过Arpanet进行自我复制。也就是说,美国政府的电
13、脑被一个大学生入侵了。故选C。4What did companies decide to do to protect their computer systems?AEmploy computer talents. BBuild secret defense systems.CAsk the government for help.DCollect and analyze the data of hackers.答案:A解析:考查细节理解。根据倒数第三段中的“Many companies have hired experts to protect their computers from ha
14、ckers, and many computer experts now advise companies on how to protect their computers. ”可知许多公司聘请了专家来保护他们的计算机免受黑客攻击并且许多计算机专家如今会建议公司如何保护他们的计算机。故选A。.七选五 Lots of people give you advice on overcoming fear. _1_ However, I want to tell you that a world without fear would be more dangerous, less rewarding
展开阅读全文
课堂库(九科星学科网)所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
链接地址:https://www.ketangku.com/wenku/file-440413.html


2019届人教A版数学必修二同步课后篇巩固探究:2-1-1 平面 WORD版含解析.docx
