admin管理员组文章数量:1579976
2024年5月21日发(作者:)
2013年高考英语阅读理解与完型填空:网络安全
When the Internet on your laptopifrom your dorm or home, do; you
know .your personaldetails are being gathered secretly? And would you be -surprised
to know the information may be soldeheaply to advertisers and
marketers? . .
According to an inve~tigation by The Wall Street Jourmd, all
it takes is a tiny frle in a computer-a single code consisting of a long serigs
of numbers and letters-to record the computer user's age,gender, location, favorite
movies and hobbies.
The newspaper reports that Lotame Solutions,Iric,., ai~Jew York company,
uses sophisticatedsoftware called a "beacon" lo capture what people are typingiqn
a website. '
Lotame packages that data into profiles about individuals, only without
their names, and sells theprofiles to companies seeking customers. Batches*of such
data may be sold for a few dollars.
;The survey d18covered that spying on Intemet users§ one of the
fastest-growin~l; busmesses onthe'World Wide
Web. . '
i . .
~.. ' The "cookie"-a tiny text. file put on your PC by websites or marketing
finns which might be usedto remember your preferences for one site, or to track you
across many sites is already old news. Thereare r7ew and more, complex tools such
as "beacons"..which scan in,real time what people are doing on awebpaf;e. These
beacons instantly assess the Internet user's location,..income, shopping interests
andeven medical conditions. , .-Millions of Intemet users around
the'world also face unprecedented(空前的) threats. Private,sensitive, personal and
business information is being gathered and sold without their knowledge.
Companies insist the information they ~ather is anonymous and the data
is used hannlessly. Butthe technology has Sprown so powerful that eVen some of the
biggest websites in the US don't know thatthey were installing intnisive files on
visitors' computers. These include and * Next time you visit
a webpage and fmd an ad banner advertising 90mething you've been planningto buy,
don'.t be amazed that your computer can read your mind. . '
1. The purpose of the passage is to _ .
A. introduce a tiny file in a computer-a single code
B. show how your individual information was let out whert ASLirfing
the Intemet
C. show how to protect your privacy
D. introduce a sophisticated software called a "beacon" =
2. What can be inferred from the passage?
A. Because the data is used harmlessly, Intemet users around the
world will not face threats.
B. When a person sLufs the Intemet, his personal details may be let
out without his knowledge.
C. Your computer can really read your mind with the help of some
hardware. . .
D. and use software to capture what people are
typing on a website.
3. According to the passaf;e, "beacon" in the third paragraph _
A. is a tiny text file put on your PC by websites
B. is a software that can package that data into profiles about
individuals
C. can assess the Inteinet user's'personal information
D. js nqt more complex than the "coo ie"
4. What's the writer's attitude to this problem?
A. Neutral.
Worried.
Optimistic. D. Indifferent.
B.
C.
版权声明:本文标题:高考英语 阅读理解与完型填空 网络安全 内容由热心网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:https://www.elefans.com/xitong/1716265571a494828.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论