

Preview text:
PASSAGE 24
Although computers are considered the most perfect and effective devices in our modern time, we cannot
avoid some certain problems when we are working on a computer. Letters and phone conversations are
private. It is against the law to open someone's mail without permission or to listen secretly to someone's
telephone conversation. And now there are laws to protect the privacy of e-mail. It is also against the law
to read the messages that a person sends or receives on a computer. Although each person has a secret
password for his or her e-mail, sometimes the passwords are discovered by hackers and the mailbox is opened.
Recently several companies that do business on the Internet have been attacked. The attackers sent huge
amounts of useless e-mails to the Web sites of these companies. The effect was to slow or stop the ability
of the companies to do their business. Such actions are known as "denial of service" attacks. The
companies say they may have lost millions of dollars because they were not able to provide goods and
services during the attacks. Most of the companies were able to solve the problem in about three hours.
The victims of the attacks included some of largest and most successful companies on the Internet, such
as Yahoo, Amazon, and Com and E-Trade. The police have investigated the attackers. The computer
industry leaders have discussed the electronic attacks and the problems of computer crime. They suggest
that a person who is found guilty of such a crime should be sentenced to at least lo years in prison. Question 1. It is
to read the messages that a person send or receive on a computer. A. legal B. illegal C. encouraged D. advisable
Question 2. Which sentence is true?
A. It is quite secret to send or receive messages through the Internet.
B. We need a password to open an email box.
C. We never have problems with email.
D. E-mails on the Internet are open letters.
Question 3. What happened to some companies that do business on the Internet?
A. They were electronically attacked.
B. They were closed because they are broke.
C. They stopped working because all computers were out of order.
D. They stopped working because of no power.
Question 4. What did the hackers do?
A. They attacked the network by computer viruses.
B. They made a lot of orders through the Internet.
C. They sent a lot of e-mails to the companies.
D. They sent useless e-mails to the Web sites of these companies.
Question 5. Most of the companies
A. could solve the problem
B. could not solve the problem C. closed
D. were sentenced to about ten years in prison
Question 6. Which of the followings is NOT true?
A. Computer is one of the most effective devices in our modern times.
B. It is illegal to open someone’s mail without permission. Page 1
C. Passwords are hardly stolen by hacker.
D. The attacked companies have lost a lot of money.
Question 7. How long does it take to deal with the problem caused by hacker? A. About one day B. About 30 minutes C. About 3 hours D. About one hour
Question 8. The word “they” in the first paragraph is referred to ?
A. goods and services B. attacks C. companies D. hackers ĐÁP ÁN 1-B 2-B 3-A 4-D 5-A 6-C 7-C 8-C Page 2