首页
登录
职称英语
The Internet began in the 1960s as a small network of academic and governmen
The Internet began in the 1960s as a small network of academic and governmen
游客
2023-07-26
57
管理
问题
The Internet began in the 1960s as a small network of academic and government computers primarily involved in research for the U. S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 mil- lion U. S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks. "Brick and mortar" banks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to their home or office. Companies doing business over the
Internet need sophisticated security measures to protect credit card, hank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain un-authorized access to the organization’s computer systems and data. [br] The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online network
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
转载请注明原文地址:https://tihaiku.com/zcyy/2871767.html
相关试题推荐
InternetAlmosteveryonewithorwithoutacompu
InternetAlmosteveryonewithorwithoutacompu
InternetAlmosteveryonewithorwithoutacompu
InternetAlmosteveryonewithorwithoutacompu
InternetAlmosteveryonewithorwithoutacompu
Youracademicperformanceisonething,and____________(你的实际工作能力又是另一回事了)yourac
Itisofgreatsignificanceforagovernmentto____________(作出努力)conserveenda
BritishteachingunionsSundaycautiouslywelcomedgovernmentplanstoexten
BritishteachingunionsSundaycautiouslywelcomedgovernmentplanstoexten
BritishteachingunionsSundaycautiouslywelcomedgovernmentplanstoexten
随机试题
Cooperationisthecommonendeavoroftwoormorepeopletoperformatasko
[img]2018m11s/ct_eyyjsdz2018j_eyyjsda_0108_201809[/img][originaltext]W:Hmm...
[originaltext]Thechairlooksverynice.Howmuchisit?[/originaltext]A、It’sc
有-饱和黏土试样在固结仪中进行固结试验,该试样原始高度为20mm,面积为30cm
下列有关医际关系与医患关系的表述错误的是A、医际关系的恶化在一定程度上将对医患关
简述急性冠脉综合征的定义及其病理机制。
下列关于财务尽职调查的说法中,错误的是()。A.财务尽职调查多使用趋势分析、结构
()可以管理系统性风险和非系统性风险。A.风险转业 B.风险分散 C.
微机防误装置系统应制定()管理办法;并设有在紧急情况下分层解锁程序和权限。
马斯洛需求层次理论包括:( )A.生理需求 B.安全需求 C.爱和归
最新回复
(
0
)