Passage 3
The advent of computers has brought with it a new set of opportunities for mischief (危害) and crime. Today, computers are easy to come by and many people know how computer technology works. More importantly, the growing use of computer networks can multiply a breach (破坏) of security, making larger numbers of people more vulnerable(脆弱的) than would be the case if they were using single, stand-alone computers.
What’s more, computer experts agree that despite recent widespread publicity-
computer viruses(病毒) are only one of many computer security problems facing the nation.
The U.S. Defense Advanced Research Project Agency has requested that the Research Council’s(委员会) Computer Science and Technology Board assess(评定) the security problems posed by computer technology, see what solutions may already exist, review research efforts aimed at avoiding security problem in the future, and evaluate existing policies relevant to computer security. The study committee will examine the issue of security for a broad spectrum of users, including the business, national security, and academic communities, as well as the general public.
David D.Clark, senior research scientist, Laboratory for Computer Science, Massachusetts Institute of Technology, will chair the committee of experts in electronic security, net work security, computer law, software engineering, cryptography(密码编制), and operating systems. The committee will also include computer users from the defense and banking industries.
37. Which of the following is most likely to be agreed by computer experts?
A. Computers are easily available.
B. There are many kinds of computer security problems.
C. Computer viruses are the only problem facing the computer network.
D. The growing use of computer networks can multiply a breach of security.
38. The phrase “a broad spectrum” in Para.3 probably means _______.
A. a wide range B. a continuous range
C. a set of hands of colored light D. a range of various kinds of waves
39. The Research Council’s Computer Science and Technology Board aims to _______.
A. consider research efforts to keep away from security problems in the future
B. assess the security problems put forward by computer technology
C. evaluate policies for computer security
D. do all of the above
40. What is the title of the passage?
A. Computer Users. B. Computer Viruses.
C. Computer Security. D. Computer Networks.