首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Your camera is snatched. Will you ever see it a-gain? Probably not. But it may send postcards from its new owner. The【C1】______o
Your camera is snatched. Will you ever see it a-gain? Probably not. But it may send postcards from its new owner. The【C1】______o
admin
2017-08-11
60
问题
Your camera is snatched. Will you ever see it a-gain? Probably not. But it may send postcards from its new owner. The【C1】______of recovery of lost or stolen cameras have improved【C2】______newer devices combined with online photo-sharing services create a digital track one can【C3】______with the right tools.
Dozens of cameras from major manufacturers【C4】______the serial number found on a camera’s body into its software as well. The serial number is then included in the metadata with which every picture taken by the camera is tagged. When a photo is uploaded at sites like Flickr, they can, therefore, be【C5】______and indexed. Mr. Westin’s company, which makes the Gadget-Trak theft-recovery applications, has begun to create a searchable image database for lost cameras. When the owners upload the tagged photos they provide the【C6】______link. Once the database is established, the company will compare it with that of a list of missing serial numbers【C7】______by police.
Of course, even if a camera’s serial number crops up,【C8】______the device’s current location need not be【C9】______. However, there is also good news: posted pictures may give clues【C10】______its current location. Even more helpfully, more and more cameras now come 【C11】______a GPS receiver for inserting geographical coordinates into a picture’s metadata. Flickr won’t show the uploading account holder such information【C12】______a user explicitly permits it. Photos posted in other ways, 【C13】______, may leak this information more casually. With enough such【C14】______, police could ask a photo service or obtain a(n)【C15】______to retrieve location data stored in the user’s account.
Mr. Westin says that photographers can examine an image taken by their camera【C16】______losing it and extract the serial number. He wants to release a tool to make this【C17】______. All this is, of course, a double-edged【C18】______. Any information that helps find stolen
【C19】______may also be used to track camera owners’ activities. Tools to【C20】______such data before photos are uploaded to the internet are available. And thieves know it.
【C4】
选项
A、divide
B、pose
C、embed
D、write
答案
C
解析
上文提到新的相机设备配合在线图片共享服务能创建可跟踪的电子轨迹。这里讲到追踪的原理,下文说该序列号被包含在元数据里,只要照相就会被贴上标签,有助于追踪。可推断相机将机身上的序列号也嵌入到机身软件里。故选C项embed“嵌入”。
转载请注明原文地址:https://www.kaotiyun.com/show/sgbZ777K
0
考研英语一
相关试题推荐
Wemaintainthatingeneralafocusonpositiveinformationbenefitswell-being.However,thereareprobablyconditionswhenac
Bigdecisionsmakemenervous.I’mokaywhenitcomestoorderingdinnerorbuyinganewpairofjeans,butifI’mselectingah
"Always"."Never".TheseareprobablythetwomostpowerfulwordsintheEnglishlanguage.Evenmorepowerfulthanyesandno,s
"Always"."Never".TheseareprobablythetwomostpowerfulwordsintheEnglishlanguage.Evenmorepowerfulthanyesandno,s
LatinAmerica—aplacelongassociatedwithfinancialdisaster—hasremainedimprobablycalm,whiletheripplesofAmerica’ssubpr
LatinAmerica—aplacelongassociatedwithfinancialdisaster—hasremainedimprobablycalm,whiletheripplesofAmerica’ssubpr
LatinAmerica—aplacelongassociatedwithfinancialdisaster—hasremainedimprobablycalm,whiletheripplesofAmerica’ssubpr
Consumersandproducersobviouslymakedecisionsthatmoldtheeconomy,butthereisathirdmajor【C1】______toconsider,therol
Consumersandproducersobviouslymakedecisionsthatmoldtheeconomy,butthereisathirdmajor【C1】______toconsider,therol
Consumersandproducersobviouslymakedecisionsthatmoldtheeconomy,butthereisathirdmajor【C1】______toconsider,therol
随机试题
京剧艺术家梅兰芳先生所扮演的角色属于
肺实变阻塞性肺不张
儿童传染性软疣好发部位为
某普通合伙企业为内部管理与拓展市场的需要,决定聘请陈东为企业经营管理人。对此,下列哪一表述是正确的?(2015年卷三29题,单选)
建立账套(1)账套信息账套编码:004账套名称:烟台制造有限公司采用默认账套路径启用会计期:2011年12月会计期间设置:12月1日至12月31日(2)单位信息单位名称:烟台制造有限公司(3)核算类型该企业的记账本位币:人民币;行业性质
下列项目中,不属于非货币性资产交换的有()。
教师与学生之间的教育法律关系为()法律关系。
中国古代历史上最后一个由汉族建立的中原王朝是()。
无产阶级革命取得胜利的根本保证是()
A、Toattackhackers’computers.B、Toprotectpeoplefrombeingattackedbyhackers.C、Toimprovetheircomputerskills.D、Totes
最新回复
(
0
)