niusouti.com

The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has (1) across the Web.Can privacy be preserved (2) bringing safety and security to a world

题目

The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has (1) across the Web.

Can privacy be preserved (2) bringing safety and security to a world that seems increasingly (3) ?

Last month, Howard Schmidt, the nation's cyber-czar, offered the federal government a (4) to make the Web a safer place a "voluntary trusted identity" system that would be the high-tech (5) of a physical key, a fingerprint and a photo ID card, all rolled (6) one. The system might use a smart identity card, or a digital credential (7) to a specific computer, and would authenticate users at a range of online services.

The idea is to (8) a federation of private online identity systems. User could (9) which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver's license (10) by the government.

Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to (11) just once but use many different services.

(12) , the approach would create a "walled garden" cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of a (13) community.

Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with (14) ,trusting the identities of each other and the identities of the infrastructrue (15) which the transaction runs".

Still, the administration's plan has (16) privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would (17) be a compulsory Internet "drive's license" mentality.

The plan has also been greeted with (18) by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt would still leave much of the Internet (19) . They argue that all Internet users should be (20) to register and identify themselves, in the same way that drivers must be licensed to drive on public roads.

(1)

A.swept

B.skipped

C.walked

D.ridden


相似考题
更多“The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has (1) across the Web.Can privacy be preserved (2) bringing safety and security to a world ”相关问题
  • 第1题:

    Recent federal regulatory activity has been _______ to protect the privacy of consumer’s personal information.

    A.implementing
    B.implement
    C.implemented
    D.implements

    答案:C
    解析:

  • 第2题:

    The Internet affords anonymity to its users,a blessing to privacy and freedom of speech.But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3?Last month,Howard Schmidt,the nation’s cyber-czar,offered the federal government a 4 to make the Web a safer place-a“voluntary trusted identity”system that would be the high-tech 5 of a physical key,a fingerprint and a photo ID card,all rolled 6 one.The system might use a smart identity card,or a digital credential 7 to a specific computer.and would authenticate users at a range of online services.The idea is to 8 a federation of private online identity systems.User could 9 which system to join,and only registered users whose identities have been authenticated could navigate those systems.The approach contrasts with one that would require an Internet driver’s license 10 by the government.Google and Microsoft are among companies that already have these“single sign-on”systems that make it possible for users to 11 just once but use many different services.12.the approach would create a“walled garden”n cyberspace,with safe“neighborhoods”and bright“streetlights”to establish a sense of a 13 community.Mr.Schmidt described it as a“voluntary ecosystem”in which“individuals and organizations can complete online transactions with 14,trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs”.Still,the administration’s plan has 16 privacy rights activists.Some applaud the approach;others are concerned.It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet“drive’s license”mentality.The plan has also been greeted with 18 by some computer security experts,who worry that the“voluntary ecosystem”envisioned by Mr.Schmidt would still leave much of the Internet 19.They argue that all Internet users should be 20 to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.20选?

    A.invited
    B.appointed
    C.allowed
    D.forced

    答案:D
    解析:
    词义辨析【直击答案】本空格所在句是They argue that all Internet users should be__20__to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.本句含义为“他们认为所有的互联网用户都应注册并证明自己身份,就像司机在公路上驾驶必须有驾照一样。”解答本题,后一句中的must是重点,司机必须有驾照,同理,网络用户也必须注册和证明自己身份。所以本题答案为D项forced“强迫”。be forced to…等同于must。【命题思路】该题考查的是词义辨析。【干扰排除】从语法角度讲,每个选项带进空格都正确,但是语义上就讲不通了。首先根据意思排除A、B项。网络用户注册并确认身份本来就是文中赞成的观点,进而排除C项。

  • 第3题:

    Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
    It can be inferred from Paragraph 4 that privacy legislation is likely to_____

    A.be opposed by tech companies
    B.cause concerns among consumers
    C.promote corporate innovation
    D.hinder the popularity of apps

    答案:C
    解析:
    [信息锁定]第四段首先指出隐私立法反对者的观点:立法会阻碍科技公司创新。作者转而进行反驳:若信任脱离该体系,则创新很可能会变糟。最后举例说明:若消费者担忧智能手机apps会如何处置其数据,则新apps将难以大获成功”。可见作者认为:立法不会阻碍创新,反而是创新的保证,C.正确。[解题技巧]A.由第四段②句…keep technology companies from innovating(隐私立法会阻碍公司创新)主观推知“隐私立法会招致公司反对”,但这是“立法反对者(opponents)观点”(是作者驳斥的看法)。由段末句可知,大部分公司欢迎隐私立法。B.对④句consumers worry断章取义,作者并非指出“立法会引发消费者担忧”,而是以条件句式(lf…,fewer...)强调“若消费者担忧自己数据的安全.则会阻碍新应用的采用(即:立法非常必要)”。D.源自④句fewer new offerings will take off,但这并非是“立法的影响”,而是“消费者担忧自己数据安全会造成的结果”(立法会大大消除这种担忧)。

  • 第4题:

    Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
    The most suitable title for this text would be____

    A.American firms in Europe will have to comply with the GDPR
    B.America should protect its citizens'privacy and its firms'health
    C.America should borrow from Europe's data-privacy law
    D.America's data economy is evolving into a new era

    答案:C
    解析:
    [信息锁定]文章前两段提出观点“就数据隐私,美国应借鉴欧盟方法(即《通用数据保护条例》)”。第三至五段从保护个人隐私,促进公司健康发展、保障技术创新、减少立法碎片等方面论证说明理由。末段总结发出呼吁“GDPR虽远非完美,但依然可用作数据保护的法律模版;美国应改变以前的自我监管方式、指定隐私保护法”。可见全文核心在于“美国应借鉴欧盟的隐私法GDPR”.C.为恰当标题。[解题技巧]A.未抓住本文主要面向对象:文章面向的是“美国(Amercica)”,而非“美国公司。B.符合作者总体观点,但未体现本文立足点“美国应通过借鉴欧洲的GDPR来保护其公民隐私及公司健康”。D.偏离本文关注对象:作者重点关注的是“数据隐私的保护”,而非“数据经济的发展”。

  • 第5题:

    The Internet affords anonymity to its users,a blessing to privacy and freedom of speech.But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3?Last month,Howard Schmidt,the nation’s cyber-czar,offered the federal government a 4 to make the Web a safer place-a“voluntary trusted identity”system that would be the high-tech 5 of a physical key,a fingerprint and a photo ID card,all rolled 6 one.The system might use a smart identity card,or a digital credential 7 to a specific computer.and would authenticate users at a range of online services.The idea is to 8 a federation of private online identity systems.User could 9 which system to join,and only registered users whose identities have been authenticated could navigate those systems.The approach contrasts with one that would require an Internet driver’s license 10 by the government.Google and Microsoft are among companies that already have these“single sign-on”systems that make it possible for users to 11 just once but use many different services.12.the approach would create a“walled garden”n cyberspace,with safe“neighborhoods”and bright“streetlights”to establish a sense of a 13 community.Mr.Schmidt described it as a“voluntary ecosystem”in which“individuals and organizations can complete online transactions with 14,trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs”.Still,the administration’s plan has 16 privacy rights activists.Some applaud the approach;others are concerned.It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet“drive’s license”mentality.The plan has also been greeted with 18 by some computer security experts,who worry that the“voluntary ecosystem”envisioned by Mr.Schmidt would still leave much of the Internet 19.They argue that all Internet users should be 20 to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.15选?

    A.on
    B.after
    C.beyond
    D.across

    答案:A
    解析:
    词义辨析【直击答案】本空格所在句…trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs.本结构是动词的现在分词形式作伴随状语;__15 which the transaction runs是空格前infrastructure的定语从句(介词前置),意为“交易所赖以运行的网络基础设施”。所给四个选项中,只有A项on和run搭配,即run on有“运行于……”的含义。【命题思路】该题考查介词的使用及固定搭配。【干扰排除】该题要根据固定搭配的意思进行筛选,其余选项意思不符。Still,the administration's plan has 16 privacy rights activists.Some applaud the approach;others are concerned.It seems clear that such a scheme is an initiative push toward what would 17__be a compulsory Internet“driver’s license”mentality.The plan has also been greeted with 18__by some computer security experts,who worry that the“voluntary ecosystem”envisioned by Mr.Schmidt would still leave much of the Internet__19.They argue that all Internet users should be 20 to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.【译文】尽管如此,隐私权力保护人士对美国政府的这项计划持不同意。一些人对此拍手叫好,而另外一些人则表示有所担忧。这似乎很清楚,即这样的计划是最终推向一种强制性互联网“驾照”思维模式的主动推动力。该计划也遭到了一些计算机安全专家的质疑,他们担心Schmidt先生所设想的“自愿生态系统”仍然会使互联网的大部分受到攻击。他们主张,所有互联网用户都必须注册并提供身份识别,就像司机在公共道路上驾驶必须持有驾照一样。

  • 第6题:

    Text 2 Internet service providers have realized that they are sitting on a treasure chest of data about your online activities that they could be selling to advertisers.Recognizing the privacy threat,the Federal Communications Commission adopted rules that would have stopped them from doing so without your consent,but Congress recently shot down the regulation.This is a big deal.Privacy doesn't merely benefit individuals;it fundamentally shapes how society functions.It is crucial for marginalized communities and for social movements.Privacy enables these groups to network,organize,and develop their ideas before challenging the status quo.But when people know they're being tracked and monitored,they change their behavior.This chilling effect hurts our intellectual freedoms and our capacity for social progress.The data that tracks our behavior feeds into machine-learning algorithms that make judgments about us.When used for advertising,they can reproduce our own prejudiced behavior.Marketers can use machine learning to figure out your unique features-do you resDond better to words or to pictures?Do you make impulsive shopping decisions?-to target you with exactly the advertisement that will best persuade you.When consequential decisions about employment or loans are made using this kind of data,the result can feel absurd and incomprehensible,because these systems aren't programmed to explain their decisions.There aren't yet effective ways for humans to hold algorithms accountable for how they categorize us.The good news is how effective technology can be in preventing tracking.We found that ad blockers and other browser-privacy tools can decrease tracking by 80 percent or more.More complex tools can be even more effective.In other worcls,the more technically savvy among us can enjoy dramatically better privacy and digital freedoms.But this has resulted in a technological"arms race,"which is worrying by itself,but also because such technical skill correlates with historically advantaged groups.Meanwhile,publishers are caught in the ad-blocking crossfire,endangering the free press.One bright spot is that online privacy research has had a tremendous effect.It has helped regulators curb the worst of the offenses,forced companies to roll back invasions because of public-relations pressure,spurred the development of privacy tools,and developed a healthy public debate about online tracking.The fight for privacy is now closely linked to the fight for digital civil liberties and democratic values,and it is a movement that includes activists,artists,journalists,researchers,and everyday users of technology.There's tremendous power in your hands to take charge of your own privacy as well as foster these societal values.
    Which of the following statements about privacy is true?

    A.It affects individual activities more than social operations.
    B.It benefiis marginalized groups but hurts the mainstream.
    C.It conflicts with the pursuit of intellectual freedoms.
    D.It contributes to the advancement of society.

    答案:D
    解析:
    [信息锁定]第二段①句提出作者观点:隐私不仅有益于个体,还从根本上影响社会运作。②至⑤句具体解释:隐私保护有益于边缘群体和社会运动(往往是推动社会进步的力量),隐私威胁损害知识自由以及我们推动社会进步的能力。可见D.正确。[解题技巧]A.将第二段①句privacy doesn't merely.…it…(不仅仅……而且……)所含“递进逻辑”篡改为“对比逻辑(affec1...morethan.…)”。B.由第二段②句“隐私有益于边缘群体”主观推出“隐私伤及主流群体”,却与末句“隐私助益知识自由和社会进步/对整个社会有益”相悖。C.与第二段①⑤句“隐私受到威胁时人们会改变其行为,这危及知识自由(即:隐私有益于追求知识自由)”完全相悖。

  • 第7题:

    Text 2 Internet service providers have realized that they are sitting on a treasure chest of data about your online activities that they could be selling to advertisers.Recognizing the privacy threat,the Federal Communications Commission adopted rules that would have stopped them from doing so without your consent,but Congress recently shot down the regulation.This is a big deal.Privacy doesn't merely benefit individuals;it fundamentally shapes how society functions.It is crucial for marginalized communities and for social movements.Privacy enables these groups to network,organize,and develop their ideas before challenging the status quo.But when people know they're being tracked and monitored,they change their behavior.This chilling effect hurts our intellectual freedoms and our capacity for social progress.The data that tracks our behavior feeds into machine-learning algorithms that make judgments about us.When used for advertising,they can reproduce our own prejudiced behavior.Marketers can use machine learning to figure out your unique features-do you resDond better to words or to pictures?Do you make impulsive shopping decisions?-to target you with exactly the advertisement that will best persuade you.When consequential decisions about employment or loans are made using this kind of data,the result can feel absurd and incomprehensible,because these systems aren't programmed to explain their decisions.There aren't yet effective ways for humans to hold algorithms accountable for how they categorize us.The good news is how effective technology can be in preventing tracking.We found that ad blockers and other browser-privacy tools can decrease tracking by 80 percent or more.More complex tools can be even more effective.In other worcls,the more technically savvy among us can enjoy dramatically better privacy and digital freedoms.But this has resulted in a technological"arms race,"which is worrying by itself,but also because such technical skill correlates with historically advantaged groups.Meanwhile,publishers are caught in the ad-blocking crossfire,endangering the free press.One bright spot is that online privacy research has had a tremendous effect.It has helped regulators curb the worst of the offenses,forced companies to roll back invasions because of public-relations pressure,spurred the development of privacy tools,and developed a healthy public debate about online tracking.The fight for privacy is now closely linked to the fight for digital civil liberties and democratic values,and it is a movement that includes activists,artists,journalists,researchers,and everyday users of technology.There's tremendous power in your hands to take charge of your own privacy as well as foster these societal values.
    Online privacy research has had a tremendous effect by____.

    A.providing evidence to regulators
    B.fining companies for invasions
    C.designing privacy tools
    D.raising public awareness

    答案:D
    解析:
    [信息锁定]第五段①句指出网络隐私研究已产生重大影响。②句指出研究借助公共关系压力迫使公司减少隐私侵犯,并生成了有关网络追踪的健康公众辩论。③④句说明现状:隐私斗争已是全民广泛参与的运动,捍卫隐私的力量就在你手中。可见,网络隐私研究强化了公众的网络隐私保护意识,D.正确。[解题技巧]A.基于主观认识“研究的部分作用在于为管理者提供证据”,对第五段②句“网络隐私研究协助监管者制止严重侵犯行为”过度推导,但文中并未提及网络隐私研究以何种方式出助监管。B.将第五段②句研究迫使公司停止入侵的方式“借助公共关系压力”篡改为“罚款处罚”。C.将第五段②句研究“推动隐私工具发展”局限为“设计隐私工具”。

  • 第8题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第9题:

    Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()

    • A、Contoso, Ltd.
    • B、owa.contoso.com
    • C、WEB1
    • D、web1.contoso.com

    正确答案:B

  • 第10题:

    填空题
    The EU has raised concerns about its influence on consumer privacy.____

    正确答案: B
    解析:
    根据题干信息“The EU has raised concerns about”可以定位到B段“Already, the EU has raised concerns about its impact on consumer privacy”,故匹配段落为B。

  • 第11题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()
    A

    Contoso, Ltd.

    B

    owa.contoso.com

    C

    WEB1

    D

    web1.contoso.com


    正确答案: B
    解析: 暂无解析

  • 第13题:

    The Internet affords anonymity to its users,a blessing to privacy and freedom of speech.But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3?Last month,Howard Schmidt,the nation’s cyber-czar,offered the federal government a 4 to make the Web a safer place-a“voluntary trusted identity”system that would be the high-tech 5 of a physical key,a fingerprint and a photo ID card,all rolled 6 one.The system might use a smart identity card,or a digital credential 7 to a specific computer.and would authenticate users at a range of online services.The idea is to 8 a federation of private online identity systems.User could 9 which system to join,and only registered users whose identities have been authenticated could navigate those systems.The approach contrasts with one that would require an Internet driver’s license 10 by the government.Google and Microsoft are among companies that already have these“single sign-on”systems that make it possible for users to 11 just once but use many different services.12.the approach would create a“walled garden”n cyberspace,with safe“neighborhoods”and bright“streetlights”to establish a sense of a 13 community.Mr.Schmidt described it as a“voluntary ecosystem”in which“individuals and organizations can complete online transactions with 14,trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs”.Still,the administration’s plan has 16 privacy rights activists.Some applaud the approach;others are concerned.It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet“drive’s license”mentality.The plan has also been greeted with 18 by some computer security experts,who worry that the“voluntary ecosystem”envisioned by Mr.Schmidt would still leave much of the Internet 19.They argue that all Internet users should be 20 to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.2选?

    A.for
    B.within
    C.while
    D.though

    答案:C
    解析:
    词义辨析【直击答案】本空格所在句是Can privacy be preserved 2 bringing safety and security to a world…。根据上文信息,网络匿名的优点为网络使用者提供隐私保障,但与此同时网络犯罪却也正席卷着互联网。所以可判断出,该问句在提问隐私是否真正能够能得到保障呢?while意为“与……同时”。【命题思路】考查对句内逻辑的分析。【干扰排除】该句表达一种对比,在有隐私保障的同时是否具备安全性?A项for“因为,为了”,B项within“在……之内”,D项though“尽管”,在此处与doing无逻辑联系,故为干扰项。

  • 第14题:

    The Internet affords anonymity to its users,a blessing to privacy and freedom of speech.But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3?Last month,Howard Schmidt,the nation’s cyber-czar,offered the federal government a 4 to make the Web a safer place-a“voluntary trusted identity”system that would be the high-tech 5 of a physical key,a fingerprint and a photo ID card,all rolled 6 one.The system might use a smart identity card,or a digital credential 7 to a specific computer.and would authenticate users at a range of online services.The idea is to 8 a federation of private online identity systems.User could 9 which system to join,and only registered users whose identities have been authenticated could navigate those systems.The approach contrasts with one that would require an Internet driver’s license 10 by the government.Google and Microsoft are among companies that already have these“single sign-on”systems that make it possible for users to 11 just once but use many different services.12.the approach would create a“walled garden”n cyberspace,with safe“neighborhoods”and bright“streetlights”to establish a sense of a 13 community.Mr.Schmidt described it as a“voluntary ecosystem”in which“individuals and organizations can complete online transactions with 14,trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs”.Still,the administration’s plan has 16 privacy rights activists.Some applaud the approach;others are concerned.It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet“drive’s license”mentality.The plan has also been greeted with 18 by some computer security experts,who worry that the“voluntary ecosystem”envisioned by Mr.Schmidt would still leave much of the Internet 19.They argue that all Internet users should be 20 to register and identify themselves,in the same way that drivers must be licensed to drive on public roads.1选?

    A.swept
    B.skipped
    C.walked
    D.ridden

    答案:A
    解析:
    词义辨析【直击答案】本空格所在句是But that very anonymity is also behind the explosion of cybercrime that has 1 across the Web.所需填入动词在that引导的定语从句作谓语,该定语从句修饰限定其先行词the explosion of cybercrime,即网络犯罪的爆发,根据第一句信息,人们可匿名使用网络,这为网络使用者提供了隐私保障和言论自由的权利。但本句开头的but,说明本句和前一句所强调内容不同,推断出本句表达含义为“尽管网络有匿名使用的优点,但隐藏在这优点背后的是席卷网络的网络犯罪爆发”。A项有“席卷”的含义,swept原型为sweep,例:sweep across the globe席卷全球。【命题思路】考查动词和介词的搭配。【干扰排除】B项skipped“跳过”,C项walked“走过”,D项ridden“骑或搭乘”与句子主语the explosion of cybercrime搭配不当,故排除。

  • 第15题:

    Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
    Facebook is mentioned to show that_____.

    A.America needs a general data-protection law
    B.online economy relies heavily on consumer data
    C.online news can produce strong economic impact
    D.America has benefited greatly from self-regulation

    答案:A
    解析:
    [信息锁定]第三段首先指出,美国尚未通过任何一项包罗性的数据保护法,其自我监管方式的弱点正日益突显,公司几乎可以对用户数据为所欲为。最后指出,“将8700万用户的数据转给一家政治活动公司”的行为被报道之后,脸书陷入了危机。可见,文中提及脸书意在说明自我监管方法存在缺陷、美国需要一部全面的数据保护法,A.正确。[解题技巧]B.为第三段③句所述事实,但这是背景信息,并未触及核心观点,因此并非事例说明对象。且事例本身强调的是“脸书因转移用户数据而陷入危机”,并非“脸书对用户数据的依赖”。C.对事例信息“新闻披露(news)使得脸书陷入危机”过度推导,文中并非意在强调“新闻的影响”,更未指出这是“在线新闻”。D.对第四段首句the benefits of self-regulation断章取义,结合第三段③句可知,该句是在指出“自我监管方法的益处受到质疑”,选项内容与其相悖。

  • 第16题:

    Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
    Which of the following is true,according to Paragraph 5?

    A.The GDPR may result in fragmentation of international law.
    B.America is restricting its firms from doing business in Europe.
    C.American states have detected a need for greater data privacy.
    D.California is considering legislation to protect personal data.

    答案:D
    解析:
    [信息锁定]第五段指出,EU新法(GDPR)在协调各项数据保护法律,使公司可以更方便地在整个欧洲范围内做生意。美国则在反其道而行之,(并未制定统一的、出调性法律,而是)那些发现更大隐私需求的州在各自起草自己的法律。最后以加州为例:加州已形成待理法案,意在成立专门的部门,规定大型科技公司如何使用加州人的个人数据。可见D.为文中事实。[解题技巧]A.将第五段①句“借鉴欧洲的GDPR可以使美国的立法碎片最小化”偷换为“GDPR可能导致国际法碎片”,文中并未提及“国际法”。B.对firms can do business across Europe more easily.America is moving in the opposite direction断章取义.该内容意指“GDPR有利于公司在整个欧洲范围内交易;而美国却是各州纷纷设立自己的法律,限制了公司在整个美国范围内的运作”。C.将第五段④句的限制条件“那些已发现更犬隐私需求的州……”(言外之意为“有些州并未发现这种需求”)改为全部情形“美国各州已发现更大的隐私需求”。

  • 第17题:

    Text 2 Internet service providers have realized that they are sitting on a treasure chest of data about your online activities that they could be selling to advertisers.Recognizing the privacy threat,the Federal Communications Commission adopted rules that would have stopped them from doing so without your consent,but Congress recently shot down the regulation.This is a big deal.Privacy doesn't merely benefit individuals;it fundamentally shapes how society functions.It is crucial for marginalized communities and for social movements.Privacy enables these groups to network,organize,and develop their ideas before challenging the status quo.But when people know they're being tracked and monitored,they change their behavior.This chilling effect hurts our intellectual freedoms and our capacity for social progress.The data that tracks our behavior feeds into machine-learning algorithms that make judgments about us.When used for advertising,they can reproduce our own prejudiced behavior.Marketers can use machine learning to figure out your unique features-do you resDond better to words or to pictures?Do you make impulsive shopping decisions?-to target you with exactly the advertisement that will best persuade you.When consequential decisions about employment or loans are made using this kind of data,the result can feel absurd and incomprehensible,because these systems aren't programmed to explain their decisions.There aren't yet effective ways for humans to hold algorithms accountable for how they categorize us.The good news is how effective technology can be in preventing tracking.We found that ad blockers and other browser-privacy tools can decrease tracking by 80 percent or more.More complex tools can be even more effective.In other worcls,the more technically savvy among us can enjoy dramatically better privacy and digital freedoms.But this has resulted in a technological"arms race,"which is worrying by itself,but also because such technical skill correlates with historically advantaged groups.Meanwhile,publishers are caught in the ad-blocking crossfire,endangering the free press.One bright spot is that online privacy research has had a tremendous effect.It has helped regulators curb the worst of the offenses,forced companies to roll back invasions because of public-relations pressure,spurred the development of privacy tools,and developed a healthy public debate about online tracking.The fight for privacy is now closely linked to the fight for digital civil liberties and democratic values,and it is a movement that includes activists,artists,journalists,researchers,and everyday users of technology.There's tremendous power in your hands to take charge of your own privacy as well as foster these societal values.
    According to Paragraph l,Congress intends to____.

    A.protect citizens'personal data
    B.monitor advertisers'online activities
    C.allow ISPs to sell users'data
    D.approve the FCC's privacy rules

    答案:C
    解析:
    [信息锁定]第一段首先暗示互联网服务供应商行为“将用户在线活动数据卖给广告商”;随后引出联邦通信委员会对策“规定未经个人许可不得出售其在线活动数据”;最后指出国会近日决策“否决联邦通信委员会的监管规定”。可见,国会再度赋予了互联网服务供应商出售用户数据的权利,C.正确。[解题技巧]A.对首段②句前半句偷梁换柱:保护公民个人数据的是“FCC”而非“国会”。B.扭曲首段①句关系:将“ISP监控用户在线行为”改为“国会监控广告商在线行为”。D.与首段②句后半句相悖:国会是“否决了(shot down)”而非“通过了(approved)”FCC规定。

  • 第18题:

    Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
    According to Paragraphs l and 2,GDPR——.

    A.stresses commercial freedom over governmental control
    B.aims to give citizens the control of their personal data
    C.grants companies the right to collect user information
    D.recognizes the legitimacy of data transfer among firms

    答案:B
    解析:
    [信息锁定]第二段②句指出GDPR的前提是“消费者应该掌管自己的个人数据”,可见B.正确,aims to give citizens the control of their personal data同义替换its premise that consumers should be in charge of their personal data.[解题技巧]A.与首段②句同义,但这是“美国历来的观点”,并非“欧盟的GDPR特征”,整体理解首段内容可知二者实为反向。C.将第二段③句“GDPR允许用户(users)获取公司手中的其个人信息”窜改为“GDPR赋予公司(firms)收集个人信息的权利”。D.将第二段④句’‘GDPR给予了消费者将其数据转移到另一机构/公司的权利”窜改为“GDPR承认了公司之间转移数据的合法性”。

  • 第19题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第20题:

    You are the network administrator for your company. All servers run Windows Server 2003.  Twenty company employees connect to a terminal server named Server2 to run applications and to gain access to the Internet.The 20 employees report that they receive security messages while browsing Internet Web sites.  The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server2.You need to allow these 20 employees to modify the Internet Explorer security settings on their client computers while connected to Server2. What should you do?()

    • A、Log on to Server2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
    • B、Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
    • C、Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.
    • D、Uninstall Internet Explorer Enhanced Security Configuration on Server2.

    正确答案:D

  • 第21题:

    问答题
    Practice 3  BBC World Service is the world's biggest radio network, with 140 million listeners across the globe, broadcasting in 44 languages, heard on short-wave, medium-wave, FM and satellite. We have an ambitious plan for the brand new technology of Digital Broadcasting by Satellite, due to start next year. The appearance of the Internet has taken us broadcasters all by surprise. The Internet has enabled any radio station anywhere to become an international broadcaster with only a minor investment. Although its sound quality is far from perfect, it excels that of short-wave. Internet radio does not only mean competition but also great opportunities. The BBC is taking the Internet very seriously, for it's a cheap way of getting a reasonable quality signal to places in the even our short-wave transmitters can't adequately reach. Very recently, we launched “BBC On-Line”, which incorporates a 24-hour news service. And the users can hear programmes in Mandarin, Arabic, Spanish and Russian.

    正确答案: 【参考译文】
    英国广播公司国际广播电台是世界上最大的广播网,在全球拥有1.4亿听众,可以通过短波、中波、调频和卫星收听以44种语言广播的节目。我们有一项雄心勃勃的计划,即明年起使用全新的卫星数码技术进行广播。国际互联网的出现使我们(广播人)措手不及。国际互联网可以使位于世界任何一个地方的广播电台以很小的投资便可成为一家国际广播站。虽然互联网广播的音质远非完善,但却胜于短波。互联网电台的出现不仅意味着竞争,同时也提供了机会。英国广播公司非成认真地对待互联网广播一事。因为互联网广播的确是一条耗资少但可以将音质不劣的信号传送到短波都无法达到的地区。最近,我们开通了一条包括24小时新闻联播在内的英国广播公司(BBC)联网(频道)。用户可以收听到汉语、阿拉伯语、西班牙语和俄罗斯语的广播节目。
    解析: 暂无解析

  • 第22题:

    问答题
    Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

    正确答案:
    1.tired of be fed up with的含义是“厌倦的”。
    2.stop plug的原意是“塞住,堵住”,上文提到微软的Windows操作系统容易受到攻击,微软就设计了一系列补丁来防止Windows操作系统受攻击。由此可知plug的意思是stop。
    3.Because Microsoft software is increasingly threatened by hackers 文章开头提到Computer Users fed up with hacker attacks and other security threats,“很多的计算机使用者受到黑客的攻击”,第三段也谈到人们对微软的Windows操作系统感到很失望,因为微软的Windows操作系统容易受到黑客的攻击。
    4.They were affected by a newly discovered vulnerability 文章倒数第三段第一句话提到Mozilla suffered a setback…counter a newly discovered vulnerability...这段话所隐含的意思是由于微软操作系统非常容易受到病毒的攻击,使得Mozilla互联网浏览器的使用者受到了不少影响。
    5.If its browser hadn’t been integrated into Windows. 文章倒数第二段开头一句话指出Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience.即微软操作系统的安全受到威胁部分是因为微软的使用者为方便把Windows界面与网络浏览器连接在一起,这样就使得微软的操作系统更容易受到病毒的攻击,因而要使微软免于病毒的攻击就只能把浏览器与Windows界面分开。
    解析: 暂无解析

  • 第23题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: A,D
    解析: 暂无解析