更多"There are over 6 000 different comp"的相关试题:
[单项选择]There are over 6 000 different computer and online games in the world now. A segment of them are considered to be both educational and harmlessly entertaining. One such game teaches geography, and another trains pilots. Others train the player in logical thinking and problem solving. Some games may also help young people to become more computer literate, which is more important in this technology-driven era.
But the dark side of the computer games has become more and more obvious. "A segment of games features anti-social themes of violence, sex and crude language," says David Walsh, president of the National Institute on Media and Family. "Unfortunately, it’s a segment that seems particularly popular with kids aged eight to fifteen."
One study showed that almost 80 percent of the computer and online games young people preferred contained violence. The investigators said "These are not just games anymore. These are learning machines. We’re teaching kids in the most incredible
A. Those that help people learn more about computers.
B. Those that teach the features of the earth.
C. Those that provide special training for writers online.
D. Those that provide special training for pilots.
[单项选择]
Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing.
(18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.
(16)是()
A. vulnerable
B. week
C. sensitively
D. helpless
[单项选择]Most computer systems are (26) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (27) to an outsider attack by preventing (28) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Detection Systems.
A. reliable
B. secure
C. indestructible
D. steady