【正文】
t is the external program.C. It is critical and useful to your puter.D. It can not be controlled at present.18.You can monitor the websites your children go to through the following ways except ________________.A. using software to prevent them from going to inappropriate websitesB. setting rules and limits for Internet useC. putting the puter in a location where you can keep an eye onD. hiding all your passwords to bank accounts19.What can you get from the FBI website?A. Pictures of the online criminals.B. Personal information about the criminals.C. Latest news about the national security.D. Current frauds that may be circulating online.20.Which of the following is NOT true according to the passage?A. You should use secured websites when shopping online.B. You can go the FBI website to get the latest information about current online scams.C. You should leave all your personal information on the websites.D. You should turn on your firewall when using the puter.。s account. In the autumn of 2003, this type of fraud was perpetrated against UK customers of Barclays, Nat West, Lloyds TSB, Citibank, Halifax and Nationwide. In fact, no bank of financial institution would ever ask a customer to disclose confidential information in this way. Another type of fraud which fortunately is not mon because of the expert knowledge required is called packet reading. This involves hackers locating patterns of data, such as credit card digits, intercepting and copying them. Another practice known as ramming involves charging a customer for extra services on top of a service for which they have signed up. A wellknown case of this kind involved the pany Xpics which ran a network that included a variety of pornography (色情) sites and offered a free trial membership on the provision (條款) of credit card details allegedly to prove that the customer was over 18. Cancelling the subscription then proved horrendously (可怕的) difficult. A much more mon type of fraud relates to online auction trading. This involves a registered seller on an established website building up a reputation, then listing for auction items which he does not possess, and finally vanishing with the winning bidder39。 in 2001, the figure was one in every 380。s mission is to serve as a vehicle to receive, develop, and refer criminal plaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a conv