首页
登录
职称英语
Whether you are logging on to your personal computer, using a credit card, o
Whether you are logging on to your personal computer, using a credit card, o
游客
2025-03-25
17
管理
问题
Whether you are logging on to your personal computer, using a credit card, or disarming a door security system, passwords or PINs(personal identification numbers) jealously guard access to numerous regular operations. It is estimated that within ten years, consumers could be faced with handling more than 100 passwords! Given the popularity of passwords, how can you choose ones that are sufficiently complicated to be secure yet are simple enough to remember?
There are basic guidelines to bear in mind. First, don’t use as a password your name or that of a member of your family, even in modified form. Also avoid use of your telephone number, your Social Security number, or your address. Such information can easily be obtained by a determined hacker (黑客).
In addition, if possible, don’t use passwords made up entirely of letters or digits. A relatively simple computer program can crack such a code quickly: Finally, do not use a word that can be found in any dictionary, even a foreign-language one. Huge lists are available that contain words, place names, and proper names from all languages. Programs can test for variations of these words, such as if they are spelled backward, capitalized, or combined.
So, what kinds of passwords should be used? Usually ones that have a minimum of six to eight characters and that have a mixture of upper-and lower-case letters, digits, and punctuation (标点) symbols. How difficult is it to crack such a combination of characters? One source says that "a machine that could try one million passwords per second would require, on the average, over one hundred years."
How can you choose a combination that is easy to remember? Some suggest that you take the title of a favorite book or film or a line from a song or poem and use the first latter from each word as your password, adding capital letters, punctuation, or other characters. For example, "to be or not to be" could become "2B/not2B".
Other suggestions include taking two short words and link them with a punctuation character, such as "High?Bug" or "Song; Tree".
Taking into account the suggestions outlined above can help you to protect important information from unwanted hackers. Remember, too, the importance of changing your passwords regularly. Just a final comment, whatever passwords you decide to use, don’t pick any of the examples given above.
选项
A、How to strengthen security through a password.
B、How to choose a password that is easy to remember.
C、How to prevent your password from being cracked.
D、How to choose a safe and convenient password.
答案
D
解析
第二篇文章全文是关于计算机“密码”。文章第一段就出现了passwords和PINs。第二段谈到了选择既安全又简单易记的密码这一问题。后面的内容对这个问题作出了回答,因此答案为D。
转载请注明原文地址:https://tihaiku.com/zcyy/4013104.html
相关试题推荐
Whenimaginativementurntheireyestowardsspaceandwonderwhetherlifee
Whenimaginativementurntheireyestowardsspaceandwonderwhetherlifee
Whenimaginativementurntheireyestowardsspaceandwonderwhetherlifee
Cybercrimeislikelytobringaboutasmuchdestructionasthecreditcrisi
Cybercrimeislikelytobringaboutasmuchdestructionasthecreditcrisi
Cybercrimeislikelytobringaboutasmuchdestructionasthecreditcrisi
Thepotentialofcomputersforincreasingthecontroloforganizationsorso
Lowinterestratescreatedeasycreditconditions,fuelingahousingconstructio
Nooneisgoingtospendmuchtimedecidingwhethertoreadaprintedadvert
Whetherit’syourfriend’stermpaperorwordsofawell-knownauthor,plagiaris
随机试题
[originaltext]Whatisthebestwaytolearnalanguage?Weshouldremember
Thebenefitsofquittingsmoking—reducedriskofcancerandmanyotherhealt
[audioFiles]2018m2s/audio_ezfj_142_201802[/audioFiles]BallGamesBallg
在重组DNA中使用最广泛的限制性核酸内切酶是下列哪一型A.I型 B.Ⅱ型 C
水泥混凝土试件成型后、脱模前的养护环境条件应满足()。A.温度20℃±2℃
急性阑尾炎患者若出现寒战、高热、黄疸,应警惕A.败血症 B.盆腔脓肿 C.膈
简述现代企业人力资源管理各个历史发展阶段的特点。
个人信贷业务是国内个人业务的主要组成部分。未核实第一还款来源或在第一还款来源不充
行政法基本原则是指反映行政法本质和具体制度规则内在联系的共同性规则。关于基本原则
A.下颌第三磨牙 B.上颌第二前磨牙 C.上颌第一磨牙 D.上颌第二磨牙
最新回复
(
0
)