问题 多项选择题

《巴黎公约》是当今国际上在工业产权保护方面最重要的公约,其主要内容有( )。

A.关于自动保护的原则,即一成员国国民的专利权、商标不需办理任何手续即可在其他成员国受到保护

B.关于优先权的规定,申请人一旦提出专利申请或商标注册申请,便可享有自申请之日起一定时期的优先权

C.展览产品的临时保护

D.专利权、商标权的独立原则,一国有权根据本国的专利法或商标法作出判断和决定,不受其他成员国的影响

E.驰名商标的保护,各成员国应禁止他人使用相同或类似于驰名商标的商标

答案

参考答案:B,C,D,E

阅读理解

It began as a game: high school and college students studying computer technology figured out they could use personal computers to break into telephone company computers and make free, long-distance telephone calls. These young computer gifts soon gained the nickname "hackers (黑客)".

Police arrested a few hackers, but many went on to even more complex hacking. One hacker was arrested for making illegal telephone calls and later used a prison phone to change a police officer's credit records to get back at (报复) the officer for arresting him. The hacker also used a computer to change his college records to give himself better grades.

As hackers gained experience, they began invading computers at banks, airlines and other businesses. In one plan, a hacker instructed an airline's computer to give him free airplane tickets.

The U.S. government is worried hackers may break into its complex networks of defense computers. The government's classified secrets are vulnerable (脆弱的) because thousands of government computers are connected by telephone lines that hackers can tap into.

In November 1988, a college student tapped into a non-classified U.S. Defense Department computer network called Arpanet. The hacker injected (输入,注入) a computer program that left copies of itself throughout Arpanet. Some hackers use each "virus " to destroy all the data in a computer. But in this case, government officials shut down the network before the program reached every computer in the system. Shutting down the system angered many researchers who were using the computers. The hacker turned himself in (自首) to police and told them how to get his program out of the computer system. He was charged with a crime.

The incident attracted computer hacking in the United States. Many companies have hired experts to protect their computers from hackers, and many computer experts now advise companies on how to protect their computers.

The U.S. government believes foreign governments have hired hackers to try to break into top-secret defense computers. It fears a hacker could inject a virus into military computers that would clean up all the data during a war.

Experts disagree over whether a computer network can ever be safe from hacking. But in the future, some of the most brilliant minds in the U.S. will be working to ruin the efforts of computer hackers and spies.

71.The main idea of the article is that _______________.

A.computer hackers only want to make free long-distance phone calls

B.the government wants to hire computer hackers to spy on the Russians

C.computer hackers are a danger to private companies and government secrets

D.many companies have hired experts to protect their computers from hackers carrying viruses

72.A computer "virus" is like a human virus because it _______________.

A.makes a computer cough and throw up

B.spreads from one computer to another

C.can clean up a person's doctor bills

D.requires regular visits to a doctor

73.A hacker can be dangerous because ________________.

A.he knows how to make free long-distance telephone calls

B.information is stored in computers, and a hacker knows how to destroy the information

C.once in prison, he can use a telephone to operate his computer

D.a hacker who steals a free airplane ticket might take a doctor of that seat on the airplane

74.U.S.government computers are vulnerable to a hacker because _____________.

A.the government always pays its telephone bills on time

B.the Russians know what's in the U.S.computers

C.viruses attack only government computers

D.many government computers are connected by telephone lines

75.In the future ________________.

A.some most brilliant minds in America will be working to stop computer hackers and spies

B.hackers will begin invading computers at banks, airlines and other businesses

C.many computer hackers will be arrested for making free telephone calls

D.some computer hackers will turn themselves in to the police

填空题