The birth of computers has brought with it a new set of opportunities for mischief and crime. Today, computers are easy to come by and many people know how computer technology 11 . More importantly, the growing use of computer networks can multiply the violation of security, making large numbers of people more vulnerable than would be the case if they were using 12 , stand-alone computers.
What's more, computer experts agree that—despite recent widespread publicity-computer viruses are 13 one of the many computer security problems facing the nation.
The U. S. Defense Advanced Research Project Agency has requested that the Research Council's Science and Technology Board 14 the security problems posed by computer technology, see what 15 may already exist, review research efforts 16 at avoiding security problems in the future, and evaluate existing policies 17 to computer security. The study committee will examine the 18 of security for a broad spectrum of users, including the business, national security, and academic communities, as well as the 19 public.
David. Clark, senior research scientist, Laboratory for Computer Science, Massachusetts Institute of Technology, will chair the 20 of experts in
electronic security, net-work security, computer law, software engineering ? and operating systems. The committee will also include computer users from the defense and banking industries.
A. only B. works C. solutions D. general
E. issue F. fundamentally G. universal H. assess
I. aimed J. single K. committee L. generates
M. relevant N. question O. community
II. B 12. J 13. A 14. H 15. C 16. I 17. M 18. E 19. D 20. K
相关推荐:
北京 | 天津 | 上海 | 江苏 | 山东 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
广东 | 河北 | 湖南 | 广西 | 河南 |
海南 | 湖北 | 四川 | 重庆 | 云南 |
贵州 | 西藏 | 新疆 | 陕西 | 山西 |
宁夏 | 甘肃 | 青海 | 辽宁 | 吉林 |
黑龙江 | 内蒙古 |