2022年考研英语冲刺阅读理解专项训练162

更新时间:2023-06-01 06:39:00 阅读: 评论:0

2022年考研英语冲刺阅读理解专项训练162 Consider cyberterrorism,assaults that can be undertaken from anywhere on the planet against anything dependent on or directed by flows of information.Call this soft terrorism.Although it can put lives in jeopardy,it can do its silent,stealthy work without tearing flesh or pulverizing structures.It can be a weapon of mass disruption rather than mass destruction,as was explained by the President’s Commission on Critical Infrastructure Protection in its l 997 report on potential cyberattacks against the“system of systems”that is modern America.
“Life is good in America,”the report says,“becau things work.When we flip the switch,the lights come on.When we turn the tap,clean water flows.”Now suppo a sudden and drastic shrinkage of life’s“taken for granted”quotient.The report notes that terrorist attacks have usually been against single targets--individuals,crowds,buildings.But today’s networked world of complexity and interconnectedness has vast new vulnerabilities with a radius larger than that of any imaginable bomb blast.Terrorists using computers might be able to disrupt
information and communications systems and, by doing s0.attack banking and financial systems,energy(electricity,oil,gas),and the systems for the physical distribution of America’s economic output.
Hijacked aircraft and powdered anthrax--such terrorist tools are crude and scarce compared with computers,which are everywhere and inexpensive.Wielded with sufficient cunnin9,they can spread the demoralizing helplessness that is terrorism’s most important intended byproduct.Computers as weapons,even more than intercontinental ballistic missiles,render irrelevant the physical geography-- the two broad oceans and two peaceful neighbors--that once was the basis of America’s n of safety.④
A threat is a capability joined with a hostile intent.In early summer l997 the U.S.military conducted a threat-asssment exerci,code-named Eligible Receiver,to test the vulnerabilities of“borderless cyber geography“.The results confirmed that in a software-driven world,an enemy need not invade the territory,or the air over the territory,of a country in order to control or damage that country’ S resoUrces.
The attack tools are on sale everywhere:computers,modems,
software,telephones.The attacks can shut down rvices or deliver harmful instructions to systems.And a cyberattack may not be promptly discovered.The report says,“Computer intrusions do not announce their prence the way a bomb does.[459 words]  1.This passage is mainly about______.击剑比赛规则
A.future terrorist attacks
描写动作的段落B.fighting against terrorism
C.weapons of mass disruption
D.weapons of mass destruction
2.The underlined word“ubiquitous”in the first paragraph most probably means______.
A.common
B.real
C.solid
宝盖头的字有哪些D.tangible颠肺流离
3.Soft terrorism is mainly directed against______.
A.dams水中捞月歇后语下一句
B.skyscrapers
C.unttling messages
D.information systems
法学专业
4.America’s n of safety may be threatened to the greatest extent when______are ud as terrorist weapons.
A.computers
B.hijacked aircraft
C.powered anthrax
D.intercontinental ballistic missiles
5.The threat—asssment exerci once conducted in U.S.______.嘴巴苦怎么办
A.obscured its cyber geography
B.confirmed the potential threat of cyberattacks
C.rendered irrelevant its physical geography
D.enhanced America’s n of safety considerably
超纲词汇
Anthrax n.炭疽热
Ballistic 弹道的
Cyber (前缀)计算机的
Cyberterrorism 计算机恐惧活动
flip v./n.轻弹,抽打
Hoover Dam n.胡佛水坝
Infrastructure 下部构造,根底下部组织,根底
Intrusion n.闯入,侵扰
jeopardy n.危急
Modem n.调制解调器
ominous 恶兆的
Pulverize研磨成粉
quotient n.份额
Shrinkage n.收缩
Ubiquitous adj.处处存在的 underscore vt./n.强调 Wield vt.支配,把握
>尽管用英语怎么说

本文发布于:2023-06-01 06:39:00,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/89/960123.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:计算机   根底   阅读   理解   冲刺
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图