首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
admin
2013-11-29
74
问题
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber crime that has【1】across the Web.
Can privacy be preserved【2】bringing safety and security to a world that seems increasingly 【3】?
Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a【4】to make the Web a safer place - a "voluntary trusted identity" system that would be the high-tech【5】of a physical key, a fingerprint and a photo ID card, all rolled【6】one. The system might use a smart identity card, or a digital credential【7】to a specific computer, and would authenticate users at a range of online services.
The idea is to【8】a federation of private online identity systems. Users could【9】which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license【10】by the government.
Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to【11】just once but use many different services.【12】the approach would create a "walled garden" in cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of【13】community.
Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with【14】, trusting the identities of each other and the identities of the infrastructure【15】which the transaction runs."
Still, the administration’s plan has【16】privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would【17】be a compulsory of Internet "driver’s license" mentality.
The plan has also been greeted with【18】by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt should still leave much of the Internet【19】. They argue that all Internet users should be【20】to register and identify themselves in the same way drivers must be licensed to drive on public roads.
【19】
选项
A、manageable
B、defendable
C、vulnerable
D、invisible
答案
C
解析
词汇题(词义选择)。空格所在句子说明一些电脑安全专家面对“voluntary ecosystem”的担忧,而“voluntary ecosystem”本来的目的是要网络安全,由此我们不难推断电脑专家的担忧是有了“voluntary ecosystem”网络仍然会不安全,所以空格中需要“不安全,容易被侵害,不可信”等类似含义。选项A.manageable意为“易处理的:可做到的”:选项B.defendable意为“可防御的”;选项C.vulnerable意为“脆弱的,易受伤的”;选项D.invisible意为“不可见的,无形的”。由此确定选项C.vulnerable为本题答案。
转载请注明原文地址:https://www.kaotiyun.com/show/u5e4777K
0
考研英语二
相关试题推荐
Overthepastdecade,manycompanieshadperfectedtheartofcreatingautomaticbehaviors-habits-amongconsumers.Thesehabits
IthasbeenawretchedfewweeksforAmerica’scelebritybosses.AIG’sMauriceGreenberghasbeendramaticallyoustedfromthef
EveryspringmigratingsalmonreturntoBritishColumbia’sriverstospawn.Andeveryspringnewreportsdetailfreshdisasters
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【1】thatbusinesseswerestill
Whateverhappenedtothedeathofnewspaper?Ayearagotheendseemednear.Therecessionthreatenedtoremovetheadvertising
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
In2010,afederaljudgeshookAmerica’sbiotechindustrytoitscore.CompanieshadwonpatentsforisolatedDNAfordecades--b
Thelongestbullruninacenturyofart-markethistoryendedonadramaticnotewithasaleof56worksbyDamienHirst,Beauti
"Theword’protection’isnolongertaboo(禁忌语)."Thisshortsentence,utteredbyFrenchPresidentNicolasSarkozylatelastmont
随机试题
某企业清算期间发生以下经济业务:(1)将企业对外投资800000元转让,收进价款600000元存入银行;(2)计算处置固定资产和无形资产应交营业税金为87200元,予以转账。要求:编制上述经济业务的会计分录。
A.安宫牛黄丸B.苏合香丸C.至宝丹D.紫雪丹E.以上都不是
患儿,9岁,出生时左侧唇腭部裂开,曾行唇腭裂手术。现检查口内见左侧牙槽突部分裂开,腭部瘢痕明显。牙槽突裂修补的最佳时间为
某工程,建设单位与施工单位按照《建设工程施工合同(示范文本)》签订了施工合同,经总监理工程师批准的施工总进度计划如图5—1所示(时间单位:月),各项工作均按最早开始时间安排且匀速施工。施工过程中发生如下事件:事件1:工作C开始后,施工单位向项目
砌体结构房屋中,混凝土梁端下设置垫块的目的是()。
在建设工程领域,易引发行政纠纷的具体行政行为中,()即行政机关根据公民、法人或者其他组织的申请,经依法审查,准予其从事特定活动的行政管理行为。
纳税人需要办理变更税务登记的情形有()。(2009年多选题)
目前,内地与香港的经贸关系已经到了密不可分的程度。据统计,去年内地与香港的贸易额达9,500多亿港元;时下有80%的香港公司在内地有投资,金额超过内地吸引外资总数的60%;此外,内地在香港的投资额也超过了400亿美元。由于香港与内地经济在结构上有着极强的互
展望理论是指人在不确定条件下的决策选择,取决于结果与展望(预期、设想)的差距而非单单结果本身。人在面临获利时,不愿冒风险;而在面临损失时,人人都成了冒险家。以下不符合展望理论的定义是()。
在软件生命周期中,能准确确定软件系统必须做什么和必须具备哪些功能的阶段是()。
最新回复
(
0
)