首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Identity theft A)Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obt
Identity theft A)Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obt
admin
2014-11-27
23
问题
Identity theft
A)Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’ s personal data in some way that involves fraud or deception, typically for economic gain.
B)The numbers associated with identity theft are beginning to add up fast these days. A recent General Accounting Office report estimates that as many as 750,000 Americans are victims of identity theft every year. And that number may be low, as many people choose not to report the crime even if they know they have been victimized,
C)Identity theft is "an absolute epidemic", states Robert Ellis Smith, a respected author and advocate of privacy, "It’ s certainly picked up in the last four or five years. It’ s worldwide. It affects everybody, and there’s very little you can do to prevent it and, worst of all, you can’t detect it until it’ s probably too late."
D)Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data, especially your social security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data, can be used, if they fall into the wrong hands, to personally profit at your expense. In the United States and Canada, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over their identities altogether, running up vast debts and committing crimes while using the victims’ names. In many cases, a victim’s losses may include not only out-of-pocket financial losses, but substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible.
E)According to the FBI, identity theft is the number one fraud committed on the Internet. So how do job seekers protect themselves while continuing to circulate their resumes online? The key to a successful online job search is learning to manage the risks. Here are some tips for staying safe while conducting a job search on the Internet.
F)Check for a privacy policy. If you are considering posting your resume online, make sure the job search site you are considering has a privacy policy, like CareerBuilder.com. The policy should spell out how your information will be used, stored and whether or not it will be shared. You may want to think twice about posting your resume on a site that automatically shares your information with others. You could be opening yourself up to unwanted calls from solicitors(推销员). When reviewing the site’s privacy policy, you’ll be able to delete your resume just as easily as you posted it. You won’t necessarily want your resume to remain out there on the Internet once you land a job. Remember, the longer your resume remains posted on a job board, the more exposure, both positive and not-so-positive, it will receive.
G)Take advantages of site features. Lawful job search sites offer levels of privacy protection. Before posting your resume, carefully consider your job search objectives and the level of risk you are willing to assume. CareerBuilder.com, for example, offers three levels of privacy from which job seekers can choose. The first is standard posting. This option gives job seekers who post their resumes the most visibility to the broadest employer audience possible. The second is anonymous(匿名的)posting. This allows job seekers the same visibility as those in the standard posting category without any of their contact information being displayed. Job seekers who wish to remain anonymous but want to share some other information may choose which pieces of contact information to display. The third is private posting. This option allows a job seeker to post a resume without having it searched by employers. Private posting allows job seekers to quickly and easily apply for jobs that appear on CareerBuilder.com without retyping their information.
H)Safeguard your identity. Career experts say that one of the ways job seekers can stay safe while using the Internet to search out jobs is to conceal their identities. Replace your name on your resume with a generic(泛指的)identifier, such as "Intranet Developer Candidate", or "Experienced Marketing Representative". You should also consider eliminating the name and location of your current employer. Depending on your title, it may not be all that difficult to determine who you are once the name of your company is provided. Use a general description of the company such as "Major auto manufacturer," or "International packaged goods supplier." If your job title is unique, consider using the generic equivalent instead of the exact title assigned by your employer.
I)Establish an email address for your search. Another way to protect your privacy while seeking employment online is to open up an email account specifically for your online job search. This will safeguard your existing email box in the event someone you don’ t know gets hold of your email address and shares it with others. Using an email address specifically for your job search also eliminates the possibility that you will receive unwelcome emails in your primary mailbox. When naming your new email address, be sure that it doesn’ t contain references to your name or other information that will give away your identity. The best solution is an email address that is relevant to the job you are seeking such as salesmgr2QQ4@provider.com.
J)Protect your references. If your resume contains a section with the names and contact information of your references, take it out. There’ s no sense in safeguarding your information while sharing private contact information of your references.
K)Keep confidential(机密的)information confidential. Do not, under any circumstances, share your social security, driver’ s license, and bank account numbers or other personal information, such as race or eye color. Honest employers do not need this information with an initial application. Don’ t provide this even if they say they need it in order to conduct a background check. This is one of the oldest tricks in the book—don’ t fall for it.
Resumes posted online for a long time will increase the risk of becoming victims of identity theft.
选项
答案
F
解析
题干:那些长期将简历放在网上的人,身份被盗用的风险会增加。首先找到题干关键词resumes postedonline(把简历放在网上),increased risk(增加风险),identity theft(身份盗用)。根据这些关键词,把题干在选项段落中定位。可以发现F段最后一句提到,简历在求职信息网页上存留的时间越长,得到正面或负面曝光的机会越多。与题干意思吻合,故本题答案为F。
转载请注明原文地址:https://www.kaotiyun.com/show/rSv7777K
0
大学英语四级
相关试题推荐
黄山黄山位于安徽省的南部。它有72座山峰,它被认为是世界上最独特,最美丽的山脉之一,是中国十大风景名胜里唯一的一座山。在中国,如果你爬山,就爬黄山吧!黄山风景四绝:云海、怪石、奇松和温泉。黄山,被称为“中国最美的山”,是中国著名历史上艺术和文学的
宜兴宜兴县,位于华东的江苏省南部,自宋代以来就是中国茶壶生产中心。高质量的宜兴粘土,先提纯,然后在高温下烧,生产出能轻微吸收茶水的陶器,得到茶爱好者们的高度赞赏。这种粘土的特殊品质使得有600多年历史的宜兴陶器区别于其他未上釉的陶器茶壶。
喝茶在中国喝茶是一种仪式,证明着等级和高雅品味。喝茶聊天是中国人中最流行的打发时间的方式,过去,他们是以进有名的茶馆开始一天的生活的。中国的茶馆相当于法国的咖啡馆和英国的酒馆。人们到这里不仅是为了喝茶,也是为了议论当地的新闻或对政治话题进行激烈的
Thinktwicenexttimewhensomeoneasksyoufor"fiveminutesofyourtime"—itcouldcostyoumorethanyouthink.ABritishpr
Topuniversitieshavebeencalledontopublishlistsof"banned"A-levelsubjectsthatmayhavepreventedthousandsofstatesc
A、Desktopmailprograms.B、Internetproviders.C、Mailservers.D、Socialnetworks.D事实细节题。短文最后提到,电子邮件软件不能左右网络服务提供商,而网络服务提供商也不能干涉电
A、Studentsin180countriescantaketheIELTS.B、Studentsin180countriescantaketheTOEFL.C、MostAmericanuniversitiesonl
Forthispart,youareallowed30minutestowriteashortessayentitledTheReturningofTraditionalChineseCulture.Youshou
A、SophialikesDavidverymuch.B、Sophiaalwayssurpriseseveryone.C、DavidlikesfollowingSophia.D、DavidoftenbreaksSophia’
A、BecausehehasfinishedhisstudyofadvancedMathematics.B、Becausehewantstoenjoyhimselfbeforeexamination.C、Becauseh
随机试题
下列因素与本例发生腹泻有关,除了[假设信息]若测得血浆HCO3为8mmol/L,有何诊断意义?应先用哪种溶液
下列不是急性白血病的临床特征的是
居住区绿地率是指()比值。
方程y’six=ylny满足定值条件y()=e的特解是:
2007年6月20日,张某到某商店买衣服,该商店故意隐瞒实情,将一件有隐蔽质量问题的衣服卖给了张某,张某仔细检查后未发现此瑕疵。7月1日,张某穿着该衣服上班,单位同事发现该衣服存在质量问题。于是张某8月1日向人民法院起诉了该商店。根据我国《民法通则》的规定
甲上市公司董事会成员有11人,根据公司章程的规定,就与股东乙公司签订合同事宜召开临时董事会会议,其中王董事是股东乙公司的副董事长。下列各项中,表述正确的是()。
(2017年)A公司是一家拥有200多名职工的中型企业。自2015年年底开始,A公司生产经营停滞,无力偿还银行贷款本息,并持续拖欠职工工资。2017年1月,A公司20名职工联名向人民法院提出对A公司的破产申请,人民法院认为该20名职工无破产申请权,做出不予
操作系统的功能主要可划分为5大管理,分别是___________、______________、_____________、___________和______________。
《义务教育数学课程标准(2011年版)》提出,通过义务教育阶段的数学学习,学生能养成良好的学习习惯。良好的学习习惯主要是指认真勤奋、独立思考、合作交流和()。
【B1】【B10】
最新回复
(
0
)