Thứ sáu, 15/11/2024
IMG-LOGO

Câu hỏi:

26/06/2024 96

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 30 to 34 

     As computer use becomes more common, the need for security is more common than ever. One of the greatest security threats in the online world is computer hacking.  

     Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?  

     Most hackers use information called protocols that are built into computer software. These protocols allow computer to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. 

     In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.  

     The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password. 

What is the main idea of this reading?

A. Famous hackers

B. Funny things that hackers do.

C. Hackers and computer security

Đáp án chính xác

D. Good ways to stop hackers.

 Xem lời giải

Trả lời:

verified Giải bởi Vietjack

Ý chính của bài văn là:

Những kẻ cắp dữ liệu và bảo mật máy tính

Những điều khôi hài mà kẻ cắp dữ liệu thường làm

Những kẻ cắp dữ liệu và bảo mật máy tính

Những cách hay để ngăn chặn hacker

Đáp án C. Giải thích:

Thông tin ở đoạn đầu: “As computer use becomes more common, the need for security is more common than ever. One of the greatest security threats in the online world is computer hacking.” (Vì máy tính trở nên ngày càng phổ biến hơn, nhu cầu bảo mật là quan trọng hơn bao giờ hết. Một trong những mối đe doạ an ninh mạng lớn nhất là sự ăn cắp dữ liệu máy tính.)

Câu trả lời này có hữu ích không?

0

Gói VIP thi online tại VietJack (chỉ 400k/1 năm học), luyện tập gần 1 triệu câu hỏi có đáp án chi tiết

ĐĂNG KÝ VIP

CÂU HỎI HOT CÙNG CHỦ ĐỀ

Câu 1:

The expansion of the natural history museum is most _______ the cause of significant revenue increases.

Xem đáp án » 08/09/2022 344

Câu 2:

Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions. 

I was upset to learn that my first opponent would be Sam Muller, who _______ part in tournaments for no less than ten years.

Xem đáp án » 08/09/2022 323

Câu 3:

Stop acting like a child. In a few weeks, you'll be coming of _______ and nobody will tolerate your foolish behavior any longer.

Xem đáp án » 08/09/2022 323

Câu 4:

______ he was sick, he still turned up for his guitar lesson.

Xem đáp án » 08/09/2022 321

Câu 5:

On Sundays, many people take their cars to service stations _______

Xem đáp án » 08/09/2022 243

Câu 6:

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 35 to 42 

      Scientists have discovered that for the last 160,000 years, at least, there has been a consistent relationship between the amount of carbon dioxide in the air and the average temperature of the planet. The importance of carbon dioxide in regulating the Earth's temperature was confirmed by scientists working in eastern Antarctica. Drilling down into a glacier, they extracted a mile-long cylinder of ice from the hole. The glacier had formed as layer upon layer of snow accumulated year after year. Thus, drilling into the ice was tantamount to drilling back through time.  

     The deepest sections of the core are composed of water that fell as snow 160,000 years ago. Scientists in Grenoble, France, fractured portions of the core and measured the composition of ancient air released from bubbles in the ice. Instruments were used to measure the ratio of certain isotopes in the frozen water to get an idea of the prevailing atmospheric temperature at the time when that particular bit of water became locked in the glacier.  

     The result is a remarkable unbroken record of temperature and of atmospheric levels of carbon dioxide. Almost every time the chill of an ice age descended on the planet, carbon dioxide levels dropped. When the global temperature dropped 9°F (5°C), carbon dioxide levels dropped to 190 parts per million or so. Generally, as each ice age ended and the Earth basked in a warm interglacial period, carbon dioxide levels were around 280 parts per million. Through the 160,000 years of that ice record, the level of carbon dioxide in the atmosphere fluctuated between 190 and 280 parts per million, but never rose much higher until the Industrial Revolution beginning in the eighteenth century and continuing today.  

     There is indirect evidence that the link between carbon dioxide levels and global temperature change goes back much further than the glacial record. Carbon dioxide levels may have been much greater than the current concentration during the Carboniferous period, 360 to 285 million years ago. The period was named for a profusion of plant life whose buried remains produced a large fraction of the coal deposits that are being brought to the surface and burned today.  

Which of the following does the passage mainly discuss?

Xem đáp án » 08/09/2022 239

Câu 7:

Professor Wallace has been given a prestigious award in _____ of his pioneering research in treating the AIDS patients.

Xem đáp án » 08/09/2022 220

Câu 8:

Despite the roadblock, the police allowed us to enter the restriction area to search for our friends.

Xem đáp án » 08/09/2022 219

Câu 9:

Of course, we don’t need this dictionary at present, but in the long ____ it may prove useful.

Xem đáp án » 08/09/2022 205

Câu 10:

The passage implies that the warmest temperatures among the periods mentioned occurred _______.

Xem đáp án » 08/09/2022 204

Câu 11:

What is not considered hacking?

Xem đáp án » 08/09/2022 192

Câu 12:

There are no problems with Dave. He seems ____ after in a proper way.

Xem đáp án » 08/09/2022 184

Câu 13:

At Lunar New Year (Tet) festival, each ethnic group in Vietnam has its own culinary specialties ______ reflect the culture of their people and are used as offerings to worship their ancestors.

Xem đáp án » 08/09/2022 183

Câu 14:

According to the passage, the Carboniferous period was characterized by________

Xem đáp án » 08/09/2022 183

Câu 15:

Mick: "What a nice watch you're wearing."  

                     Olio: " ____________"

Xem đáp án » 08/09/2022 176

Câu hỏi mới nhất

Xem thêm »
Xem thêm »