閱讀測驗是很多考生畏懼的英文題型之一,其實閱讀測驗的解題並不難,因為外國人寫文章都愛用破題法,只要看第一段即可知道文章大概在講什麼內容。此篇文章的第一段中,有提到“computer” (電腦),“security” (安全),“hack” (非法侵入),所以文章一定跟“非法侵入電腦安全系統”有關。只要耐心看完整篇文章,從文章中找線索,多讀、多練習,一定可以提升閱讀能力!


As computer use becomes more common, the need for security

is more important than ever. One of the greatest security threats in

the online world is computer hacking.

Computer hacking is the unauthorized access to a computer or

5
network of computers. Hackers, those people who illegally enter

systems, may alter or delete information, steal private information, or

spread viruses that can damage or destroy files. But how exactly can

a hacker get into a system to do these things?

Most hackers use information called protocols that are built into

10
computer software. These protocols allow computers to interact with

one another. Protocols are sort of like computer police officers.

When a computer connects to another system, the protocols check

to see if the access is valid. The protocols can also determine how

much information can be shared between the two systems. Hackers

15
can manipulate the protocols to get unlimited access to a computer

system. In fact, just the act of entering a computer network is

considered hacking. This is commonly called passive hacking.

Passive hackers get a rush from just being able to access a

challenging system like a bank or military network. Hackers that do

20
damage to a system by releasing viruses or altering, deleting, or

taking information are known as active hackers; they are, by far, the

more dangerous of the two.

The easiest way to protect a system is with a good password.

Long and unusual passwords are harder for hackers to guess. For

25
even greater security, some online services now use

“password-plus” systems. In this case, users first put in a password

and then put in a second code that changes after the user accesses

the site. Users either have special cards or devices that show them

the new code to use the next time. So if a hacker steals the

30
password, they won’t have the code. Or if the hacker somehow gets

the code, they still don’t know the password.

(  ) 1. How can hackers access the computer system?

(A) by changing the security program        (B) by manipulating the protocols

(C) by spreading viruses                          (D) by inventing a new password

(  ) 2. What would be the most proper meaning for “protocols”?

(A) a set of rules that control access to a computer

(B) a set of rules that control the way data is sent between computers

(C) a set of rules that prevent the spread of viruses

(D) a set of rules that prevent the destruction of files

(  ) 3. According to this passage, which would be considered the best way to ensure computer security?

(A) to use longer and unusual passwords

(B) to combine the use of a password with the “password plus” system

(C) to use special cards or devices

(D) to manipulate the network system

(  ) 4. Which of the following phrases best summarizes the main idea of the passage?

(A) hackers and computer security

(B) different kinds of hackers

(C) active and passive hackers

(D) how to prevent hackers from damaging computers

英銘解析


英銘老師:閱讀測驗是很多考生畏懼的英文題型之一,其實閱題測驗的的解題並不難,因為外國人寫文章都愛用破題法,只要看第一段即可知道文章大概在講什麼內容。例如在此篇文章的第一段中,有提到“computer” (電腦),“security” (安全),“hack” (非法侵入),所以文章一定跟“非法侵入電腦安全系統”有關。

第1題:駭客如何進入電腦系統?根據文章的第9行至第10行,可得知大多數的駭客利用內建於電腦軟體中所謂的電腦通信協定,因此答案是(B)。

補充:

protocol  n.  協議(書)、禮節、電腦通信協定     v.  擬訂    (always)

The protocol on the testing of nuclear weapons must be signed.

關於核武試驗的協議必須要簽署。

Mr. Barea is religious in his observance of protocol.

Barea先生十分講究禮節。

更多完整內容 請至國考專門店 英銘國考英文周刊-No.59-閱讀測驗篇

arrow
arrow
    全站熱搜

    保成補習班 發表在 痞客邦 留言(0) 人氣()