首页
登录
职称英语
The Internet began in the 1960s as a small network of academic and governmen
The Internet began in the 1960s as a small network of academic and governmen
游客
2023-11-20
68
管理
问题
The Internet began in the 1960s as a small network of academic and government computers primarily in volved in research for the U.S. military. Originally limited to researchers at a handful of universities and government facilities, the Internet has quickly become a worldwide network providing users with information on a range of subjects and allowing them to purchase goods directly from companies via computer. By 1999, 84 million U.S. citizens had access to the Internet at home or work. More and more Americans are paying bills, shopping, ordering airline tickets, and purchasing stocks via computer over the Internet.
Internet banking is also becoming increasingly popular. With lower overhead costs in terms of staffing and office space, Internet banks are able to offer higher interest rates on deposits and charge lower rates on loans than traditional banks.
"Brick and mortar"
hanks are increasingly offering online banking services via transactional websites to complement their traditional services. At present, 14 percent of Internet households conduct their banking by means of the Internet, and the figure is expected to double or triple during the next two or three years.
Increasing commercial use of the Internet has heightened security and privacy concerns. With a credit or debit card, an Internet user can order almost anything from an Internet site and have it delivered to his home or office. Companies doing business over the Internet need sophisticated security measures to protect credit card, bank account, and social security numbers from unauthorized access as they pass across the Internet. Any organization that connects its networks to the global Internet must carefully control the access point to ensure that outsiders cannot disrupt the organization’s internal networks or gain unauthorized access to the organization’s computer systems and data. [br] The last sentence of the third paragraph tells us that ______.
选项
A、any organization’s networks may be at risk of security breaches
B、current technology cannot safeguard against unauthorized access to online networks
C、information security should be a pressing concern for Internet commerce
D、organizations must secure their networks and data against unauthorized use
答案
D
解析
细节理解题。根据文章最后一段最后一句中"must control the access to ensure that…”可知作者告诫人们“必须保护网络数据不被外来使用破坏或干扰”,因此,D选项为正确答案。A、B和C选项均未在文中提到。
转载请注明原文地址:https://tihaiku.com/zcyy/3204315.html
相关试题推荐
Awiseandfrugalgovernmentshall______menfrominjuringoneanother.A、refrai
Accordingtothegovernmentsource,theunrestwassparkedby______[br][orig
In1998consumerscouldpurchasevirtuallyanythingovertheInternet.Books
In1998consumerscouldpurchasevirtuallyanythingovertheInternet.Books
In1998consumerscouldpurchasevirtuallyanythingovertheInternet.Books
WhatweretheArabmilitiasaccusedof?[originaltext]Sudan’sgovernmentha
Thenewsismainlyabout_______.[br][originaltext]TheIndiangovernmentsa
Thenewsismainlyabout_______.[br][originaltext]TheIndiangovernmentsa
Thenewsismainlyabout_______.[originaltext]TheIndiangovernmentsaysthe
TheInternetbeganinthe1960sasasmallnetworkofacademicandgovernmen
随机试题
[originaltext]M:Hey,howareyou?Youlookgood!W:Hi,Mike.Nicetoseeyou
ThesymptomsofAlzheimer’sdiseasewerelongdismissedasnormalconsequenc
一旦发生管道基础高程错,如误差在验收规范允许偏差范围内,则一般作微小的调整;超过
将运算放大器直接用于两信号的比较,如图a)所示,其中,ua=-1V,ua的波形由
岩石块体密度取决于其矿物成分、孔隙大小及含水量的多少。下列不属于测定密度方法的是
为适应基金行业快速发展的需要,回应基金行业要求成立独立的行业协会的呼声,促进基金
某跨大区联络330kV变电站曾经发生过四级电网事件,关于其巡视周期说法正确的是(
石菖蒲的主治证为A.风湿痹痛 B.声音嘶哑 C.痰湿阻窍之神昏 D.噤口痢
下列表述中,属于我国2004年《宪法修正案》内容的有()。A.将“三个代表”重
下列各项中,企业确认当期销售部门使用车辆应交纳的车船税,应借记的会计科目是()
最新回复
(
0
)