问答题
{{I}}Listen to the following passage. Altogether the passage will be read to you four times. During the first reading, which will be read at normal speed, listen and try to understand the meaning. For the second and third readings, the passage will be read sentence by sentence, or phrase by phrase, with intervals of 15 seconds. The last reading will be read at normal speed again and during this time you should check your work. You will then be given 2 minutes to check through your work once more.{{/I}}
{{B}}Please write the whole passage on ANSWER SHEET TWO.{{/B}}
【正确答案】
【答案解析】[听力原文]
{{B}}What Is a Trojan Horse?{{/B}}
Trojan home attacks pose one of the most serious threats to computer security. This passage will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security breaking program that is disguised as something benign" such as a movie or game. An example of a trojan horse was the infamous "Love Bug". If this apparent love letter was opened, it would cause a lot of problems, such as sending itself to everybody on your email address book or erasing or modifying your files, and downloading another Trojan horse program designed to steal your passwords so as to take over your computer and "remote control" it.