高考英语 阅读理解与完型填空 网络安全

2022-07-09 21:23:22   第一文档网     [ 字体: ] [ 阅读: ] [ 文档下载 ]
说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。下载word有问题请添加QQ:admin处理,感谢您的支持与谅解。点击这里给我发消息

#第一文档网# 导语】以下是®第一文档网的小编为您整理的《高考英语 阅读理解与完型填空 网络安全》,欢迎阅读!
阅读理解,填空,英语,网络安全,高考

2013高考英语阅读理解与完型填空:网络安全

When srt.ufing the Internet on your laptopifrom your dorm or home, do; you know .your personaldetails are being gathered secretly? And would you be -surprised to know the information may be soldeheaply to advertisers and marketers? . .

According to an inve~tigation by The Wall Street Jourmd, all it takes is a tiny frle in a computer-a single code consisting of a long serigs of numbers and letters-to record the computer user's age,gender, location, favorite movies and hobbies.

The newspaper reports that Lotame Solutions,Iric,., ai~Jew York company, uses sophisticatedsoftware called a "beacon" lo capture what people are typingiqn a website. '

Lotame packages that data into profiles about individuals, only without their names, and sells theprofiles to companies seeking customers. Batches*of such data may be sold for a few dollars.

;The survey d18covered that spying on Intemet users§ one of the fastest-growin~l; busmesses onthe'World Wide Web. . ' i . .

~.. ' The "cookie"-a tiny text. file put on your PC by websites or marketing finns which might be usedto remember your preferences for one site, or to track you across many sites is already old news. Thereare r7ew and more, complex tools such as "beacons"..which scan in,real time what people are doing on awebpaf;e. These beacons instantly assess the Internet user's location,..income, shopping interests andeven medical conditions. , .-Millions of Intemet users around the'world also face unprecedented(空前的) threats. Private,sensitive, personal and business information is being gathered and sold without their knowledge.

Companies insist the information they ~ather is anonymous and the data is used hannlessly. Butthe technology has Sprown so powerful that eVen some of the biggest websites in the US don't know thatthey were installing intnisive files on visitors' computers. These include MSN.com and Yahoo.com* Next time you visit a webpage and fmd an ad banner advertising 90mething you've been planningto buy, don'.t be amazed that your computer can read your mind. . ' 1. The purpose of the passage is to _ . A. introduce a tiny file in a computer-a single code B. show how your individual information was let out whert ASLirfing the Intemet

C. show how to protect your privacy

D. introduce a sophisticated software called a "beacon" = 2. What can be inferred from the passage?

A. Because the data is used harmlessly, Intemet users around the world will not face threats.

B. When a person sLufs the Intemet, his personal details may be let


out without his knowledge.

C. Your computer can really read your mind with the help of some hardware. . .

D. MSN.com and Yahoo.com use software to capture what people are typing on a website.

3. According to the passaf;e, "beacon" in the third paragraph _ A. is a tiny text file put on your PC by websites

B. is a software that can package that data into profiles about individuals

C. can assess the Inteinet user's'personal information D. js nqt more complex than the "coo ie" 4. What's the writer's attitude to this problem? A. Neutral. Worried. Optimistic. D. Indifferent.





B. C.

本文来源:https://www.dywdw.cn/0d6678bd77a20029bd64783e0912a21615797f07.html

相关推荐
推荐阅读