搜档网
当前位置:搜档网 › 新标准大学英语综合教程第三单元reading-prac

新标准大学英语综合教程第三单元reading-prac

新标准大学英语综合教程第三单元reading-practise

The Internet is overwhelmingly a power for good. It provides cheap and easy access every moment of every day to a vast reservoir of information and entertainment and it is transforming the nature of commerce and government. However, with approximately one billion users worldwide accessing almost 75 million websites, there is bound to be some offensive, and even illegal, use of the net. There is a dark side to the Internet. It would be naive to deny it. Crime on the net takes many forms including hacking, viruses, fraud and so on.

While the Washington State Attorney General's Office can help propose legislation to protect consumers against Internet crime and while we can fight Internet crime through our high-tech unit using the state's Consumer Protection Act, when it comes to other types of crimes, our efforts are limited by the office's lack of original criminal jurisdiction (司法权).

If you are a victim of an Internet crime, we encourage you to contact IC3—The Internet Crime Complaint Center—a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).

IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations.

For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral (参照) mechanism for complaints involving Internet related crimes.

The IC3 has received complaints crossing the spectrum (范围) of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, computer intrusions (hacking), economic espionage (theft of trade secrets), online extortion, international money laundering, identity theft, and a growing list of Internet facilitated crimes.

1. Which of the following is NOT true according to the

passage?

A. The Internet can provide a large amount of

information.

B. The Internet is controlled by the government.

C. There must be some offensive use of the Internet.

D. It is innocent to deny the dark side of the Internet.

2. How to describe IC3?

A. It equals to the Federal Bureau of Investigation.

B. It is a center where you can ask for help if you are a

victim of Internet crime.

C. It is the combination of the FBI and NW3C.

D. It is a center where you can find policeman to help

you catch the robbers.

3. What is IC3's mission?

A. It can accept, develop and refer criminal complaints

about the net crime.

B. It can keep all the record of the victims of on-line

attack.

C. It provides professional suggestions for individuals

to handle cyber crime.

D. It sets up a special mechanism only for authorities.

4. What kind of regulatory agency is NOT mentioned in

the passage?

A. state agency

B. federal agency

C. rural agency

D. local agency

5. What can you conclude from the passage?

A. Net crime is not so popular at this moment.

B. FBI is a center which can deal with the net crime.

C. Cyber crime has many forms.

D. We can depend on IC3 to fight against all the

crimes.

Questions 6 to 10 are based on the following passage or dialog.

Viruses, in the broadest sense, come in three forms. Virus: This is a code that attaches itself to a program in a computer and then reproduces itself. It can erase files or lock up a system. Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own. Trojan horse: This is a program that performs malicious actions while pretending to do something else. It is similar to a virus but does not try to reproduce itself.

The first PC virus—the Pakistani Brain virus—appeared in 1986. According to virus experts, as many as 200 new viruses are created every month. According to MessageLabs, in 2000 one in every 790 e-mails contained a virus; in 2001, the figure was one in every 380; and, in 2002, it was one in every 212. In 2002, the top three viruses were Klez.H, Yaha.e and Bugbear.

The most prolific virus ever is Klez and MessageLabs estimates that one in every 300 e-mails sent today contains a variation of the Klez virus. However, it is believed that there are around 20,000 different computer viruses in existence, many of them placed on the Internet deliberately to cause confusion or damage.

The threat of new, self-propagating (自动传输) viruses is growing. Melissa, ExploreZip and Ska-Happy99 forward themselves by hijacking a computer e-mail program which gives them the potential to attack globally in days. The Melissa virus originated by David Smith in March 1999 and named after one of his favorite strippers is believed to have cost businesses world-wide an estimated $385 million in damage to their systems. It led to Smith receiving 20

months in prison and a $5,000 fine. The infamous Love Bug virus of 2000 infected 45 million people in a single day and went on to cause a staggering $8.75 billion in damage. In 2001, we had the SirCam virus which, although more irritating than dangerous, still caused businesses $1.15 billion in damage.

6. Which of the following is NOT true according the first

paragraph?

A. Worm can not attach itself to files in a computer.

B. Viruses usually come in three forms.

C. Virus can move away files or lock up a system.

D. Trojan horse can reproduce itself freely.

7. In 2001, almost one in every ________________

e-mails may contain a virus.

A. 200

B. 212

C. 380

D. 790

8. What does "prolific" (Para 3, Line 1) mean?

A. active

B. progressive

C. popular

D. productive

9. Which of the following is TURE about Melissa?

A. It first appeared in March 1999.

B. It cost $5,000 million in damage to the world

business.

C. It infected 45 million people in a single day.

D. It caused a staggering $8.75 billion in damage.

10. What is the most suitable title to the passage?

A. How to Defend Viruses.

B. The New Viruses.

C. An Introduction to Viruses.

D. The Most Prolific Virus.

Questions 11 to 15 are based on the following passage or dialog.

One of the most common types of fraud on the Internet is designed to trick users of certain sites into disclosing their passwords or other confidential information needed to access their accounts. A common means of doing this is to e-mail customers advising that it is necessary to check or confirm their password by clicking onto a realistic but fake website and then inputting the confidential information. It is then possible for money to be fraudulently transferred from the individual's account.

In the autumn of 2003, this type of fraud was perpetrated against UK customers of Barclays, Nat West, Lloyds TSB, Citibank, Halifax and Nationwide. In fact, no bank of financial institution would ever ask a customer to disclose confidential information in this way.

Another type of fraud which fortunately is not common because of the expert knowledge required is called "packet reading". This involves hackers locating patterns of data, such as credit card digits, intercepting and copying them.

Another practice known as ramming involves charging a customer for extra services on top of a service for which they have signed up. A well-known case of this kind involved the company Xpics which ran a network that included a variety of pornography (色情) sites and offered a free trial membership on the provision (条款) of credit card details allegedly to prove that the customer was over 18.

Cancelling the subscription then proved horrendously (可怕的) difficult.

A much more common type of fraud relates to online auction trading. This involves a registered seller on an established website building up a reputation, then listing for auction items which he does not possess, and finally vanishing with the winning bidder's payments.

In August 2000, it was reported that US authorities were investigating a credit card fraud at https://www.sodocs.net/doc/fc4087025.html,, one of the best known purveyors (承办商) of an online currency. It was believed that the company had been defrauded of some $300,000 by a ring of credit card thieves operating out of Russia and other parts of Eastern Europe.

11. Which of the followings will NOT happen in the fraud

on the Internet?

A. The users may receive e-mails to ask them check

password.

B. The users may be attracted to click onto a realistic

but fake website.

C. The users are forced to answer all the questions on

the website.

D. The users are deceived to input their confidential

information.

12. What does "was perpetrated against" (Para 2, Line 1)

mean?

A. deceived

B. fought

C. talked to

D. penetrated

13. What is "packet reading"?

A. It involves writing e-mails.

B. It refers to locating the websites.

C. It is a kind of expert knowledge.

D. It requires users' telephone number.

14. ________________ involves charging the users for

extra services.

A. Packet reading

B. Online auction trading

C. Ramming

D. Online currency

15. What is the most suitable title for the passage?

A. Internet Fraud

B. Online Trade

C. Ramming and Packet Reading

D. Online Crime

Questions 16 to 20 are based on the following passage or dialog.

As technology changes and millions of people have access to the internet the possibility of Internet crime grows. Crime may occur in the form of fraud, identity theft and online stalking. Parents should be aware that children are vulnerable to online predators that may use the Internet to lure children into inappropriate chat rooms or in-person meetings. There are ways to protect yourself and your family from becoming a victim of Internet crime.

Install anti-spyware and antivirus software. Spyware is hidden programs that run on your computer. They monitor what you are doing online without you realizing it. It can lead to identity theft. Anti-spyware helps prevent spyware from being used. Also install antivirus software to prevent your computer from being infected with a virus.

Turn on your firewall. This helps prevent hackers from getting information such as passwords to bank accounts and other information they could use to steal funds or steal your identity.

Monitor the websites your children go to. Put your computer in a location where you can keep an eye on what they are doing online. Use software that blocks children from going to inappropriate websites. Set rules and limits for Internet use.

Talk with your children about online predators. Teach children not to engage in online chats with adults and never to give out their address to someone they meet online. Warn them never to meet someone in person they meet online. Tell children to talk to you about anything that happens inappropriate to them online.

Go to the FBI website to learn about Internet scams (诈骗). They keep the public informed about current scams that may be circulating online. They also have information on how to avoid online identity theft and investment fraud.

Use secured websites when purchasing items online and giving credit card numbers. Be wary of solicitations for donations. Check out charities before giving money.

16. What does

"lure" (Para 1

Sentence 3)

mean?

A. invite

B. force

C. attract

D. defend

17. How to define

spyware?

A. It can

secretly keep

track on your

on-line actions.

B. It is the

external

program.

C. It is critical

and useful to

your computer.

D. It can not be

controlled at

18. You can

monitor the

websites your

children go to

through the

following ways

except

____________

____.

A. using

software to

prevent them

from going to

inappropriate

websites

B. setting rules

and limits for

Internet use

C. putting the

computer in a

location where

you can keep an

eye on

D. hiding all

your passwords

to bank

accounts

19. What can you

get from the

FBI website?

A. Pictures of

the online

criminals.

B. Personal

information

about the

criminals.

C. Latest news

about the

national

security.

frauds that may

be circulating

online.

20. Which of the

following is

NOT true

according to

the passage?

A. You should

use secured

websites when

shopping

online.

B. You can go

the FBI website

to get the latest

information

about current

online scams.

C. You should

leave all your

personal

information on

the websites.

D. You should

turn on your

firewall when

using the

computer.

相关主题