According to the passage, (). 材料
Computers have become so necessary for modern living that it is difficult to believe they are a relatively recent invention. Undoubtedly, they have proved valuable, but they also have disadvantages. For example, they have increased our already large number of crimes. Hacking was the first computer crime that most of us became aware of. By using their computing expertise, hackers can gain unauthorized access to someone else’s computer and make use of the data they find there. They may, for example, find lists of their competitors’ clients and use these lists to build up their own businesses or they may use hacking technology to find out a rival company’s plans. Other hacking activities may be more obviously criminal, because hackers may log on to financial data in someone else’s computer and alter it illegally or use it for fraudulent(欺诈的) purposes. The possibility of serious financial fraud has been greatly increased by the modern practice of purchasing goods through the Internet. Apparently, the use of credit cards to pay for purchases has led to many people being swindled y (骗取)out of a great deal of money. Banks are working hard to improve online security and to provide safeguards for customers, but frauds are working just as hard to improve their techniques of deceiving people. Many computer users worry about their systems being affected by computer viruses. People who introduce these bugs into other people’s computer programs may not intentionally commit a crime but may do so as an act of mischief. The motive does not really matter to people whose data has been deleted or altered or whose files have been corrupted. Computers are part of a highly technical method of working, in which there are constantly new developments. Unfortunately, there is also a constant stream of new developments in the fraud industry associated with them. All computer users must be on their guard.
单选题

According to the passage, ().

A. computer users must be on guard against computer crimes
B. hackers have authorized access to someone else’s computer
C. people don’t have to care much about computer viruses
D. computer crimes can be prevented easily

查看答案
该试题由用户301****19提供 查看答案人数:1 如遇到问题请 联系客服
正确答案
该试题由用户301****19提供 查看答案人数:2 如遇到问题请联系客服

相关试题

换一换
热门试题
购买搜题卡 会员须知 | 联系客服
会员须知 | 联系客服
关注公众号,回复验证码
享30次免费查看答案
微信扫码关注 立即领取
恭喜获得奖励,快去免费查看答案吧~
去查看答案
全站题库适用,可用于E考试网网站及系列App

    只用于搜题看答案,不支持试卷、题库练习 ,下载APP还可体验拍照搜题和语音搜索

    支付方式

     

     

     
    首次登录享
    免费查看答案20
    微信扫码登录 账号登录 短信登录
    使用微信扫一扫登录
    登录成功
    首次登录已为您完成账号注册,
    可在【个人中心】修改密码或在登录时选择忘记密码
    账号登录默认密码:手机号后六位