皮皮学,免费搜题
登录
logo - 刷刷题
搜题
【简答题】
B Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off. As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security. When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off. But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years. Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software. In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint. This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action. 40.Which of the following statements is true according to the passage? A.It is secure to use your password as long as you hit the Return key. B.Your personal details is likely to be in danger if you spend more time on the web. C.Your password will be safe if you have some safeguards. D.Never allowing your computer to store your passwords will be safe. 41.Which of the following is NOT the reason for the unsafety of a password? A.It will be stored in RAM. B.It will be copied onto hard disk. C.It might not be overwritten. D.It will disappear as soon as you hit the return key. 42.Tal Garfinkel and his team measured the extent of security of . A.simulating the working of a complete computer system B.tagging sensitive data C.passing through the system D.running common software 43  What can be inferred from the passage? A.The length of the time the information is stored is not limited. B.The programs can not retain the information. C.The security problem should be paid more attention to. D.Some sensitive information has been copied.
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
参考答案:
举一反三
【判断题】所有经线都相交于南、北两极,两条相对的经线构成一个经线圈,将地球平分为两个半球。
A.
正确
B.
错误
【简答题】在地球仪上,与南、北极距离相等的圆圈叫________ ,它把地球平分成_____ 、_____ 两个半球。
【简答题】如问题8-9图所示,在两磁极之间放置一圆形的线圈,线圈的平面与磁场垂直。问在下述各种情况下,线圈中是否产生感应电流,并指出其方向。(1)把线圈拉扁时;(2)把其中一个磁极很快地移去时;(3)磁极慢慢地同时移去时。
【判断题】当列车通过曲线时,由于惯性力的作用,使外侧车轮轮缘挤压外轨,并使其磨耗增大;又由于曲线外轨比内轨长,外轨上车轮在外轨上滚动的同时还产生滑行,运行中的列车所受阻力比在直线上所受阻力大两者之差称为曲线附加阻力。
A.
正确
B.
错误
【单选题】在地球()画一个与地轴垂直的大圆圈(赤道平面),使圈上的每一点都和南北两极的距离相等,这个圆圈就叫做赤道。
A.
北极圈
B.
中腰
C.
南极圈
D.
通过南北极
【简答题】(5分)如图所示,在两磁极之间放置一圆形的线圈,线圈的平面与磁场垂直.问在下述各种情况中,线圈中是否产生感应电流?并指出其方向。(1)把线圈拉扁时;(2)把其中一个磁极很快地移去时;(3)磁极慢慢地同时移去时。
【单选题】当列车通过曲线时,运行中的列车所受阻力比在直线上所受阻力()。
A.
B.
不确定
C.
D.
一样
【单选题】亚历山大城成为文学艺术中心是在()在位时期。
A.
亚历山大
B.
托勒密一世
C.
托勒密二世
D.
托勒密三世
【简答题】读下图回答问题。已知图中弧线①-N-③为某经线圈中的一段,其中N为北极点,阴影为某一时刻晨昏圈平面,①、②、③、④四个点把晨昏圈平均分成四个等份,甲乙两点纬度值相同,乙地的经度为70°E。 ①地正午太阳高度为()度,昼长为()小时,④地()点日出。
【简答题】写出下列两个天球大圆的两极 (离大圆最远的两个点) 地平圈: 子午圈: 天赤道: 卯酉圈: 黄道 : 六时圈:
相关题目:
参考解析:
知识点:
题目纠错 0
发布
创建自己的小题库 - 刷刷题