首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
admin
2018-03-26
46
问题
How to Fix the Internet
A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still a marvelous and miraculous invention, but now there are bugs in the foundation, bats in the belfry, and trolls in the basement.
B) I do not mean this to be one of those technophobic rants insulting the internet for rewiring our brains to give us the nervous attention span of Donald Trump on Twitter or pontificating about how we have to log off and smell the flowers. Those worries about new technologies have existed ever since Plato was concerned that the technology of writing would threaten memorization and oratory (演讲术). I love the internet and all of its digital offshoots. What I feel sad for is its decline.
C) There is a bug in its original design that at first seemed like a feature but has gradually, and now rapidly, been exploited by hackers and trolls and malevolent actors: Its packets are encoded with the address of their destination but not of their authentic origin. With a circuit-switched network, you can track or trace back the origins of the information, but that’s not true with the packet-switched design of the internet.
D) Compounding this was the architecture that Tim Berners-Lee and the inventors of the early browsers created for the World Wide Web. It brilliantly allowed the whole of the earth’s computers to be webbed together and navigated through hyperlinks. But the links were one-way. You knew where the links took you. But if you had a webpage or piece of content, you didn’t exactly know who was linking to you or coming to use your content.
E) All of that protected the potential for anonymity. You could make comments anonymously. Go to a webpage anonymously. Consume content anonymously. With a little effort, send email anonymously. And if you figured out a way to get into someone’s servers or databases, you could do it anonymously.
F) For years, the benefits of anonymity on the net outweighed its drawbacks. People felt more free to express themselves, which was especially valuable if they were holding different opinions or hiding a personal secret. This was celebrated in the famous 1993 New Yorker cartoon, "On the Internet, nobody knows you’re a dog."
G) Now the problem is nobody can tell if you’re a troll. Or a hacker. Or a bot. Or a Macedonian (马其顿的) teenager publishing a story that the Pope has supported Trump. This has poisoned civil discourse, enabled hacking, permitted cyberbullying, and made email a risk.
H) The lack of secure identification and authentication (身份认证) inherent in the internet’s genetic code has also prevented easy transactions, obstructed financial inclusion, destroyed the business models of content creators, unleashed the overflow of spam (垃圾邮件), and forced us to use passwords and two-factor authentication schemes that would have confused Houdini. The trillions being spent and the IQ points of computer science talent being allocated to tackle security issues make it a drag, rather than a spur, to productivity in some sectors.
I) In Plato’s Republic, we learn the tale of the Ring of Gyges. Put it on, and you’re invisible and anonymous. The question that Plato asks is whether those who put on the ring will be civil and moral. He thinks not. The internet has proven him correct. The web is no longer a place of community, no longer a marketplace. Every day more sites are eliminating comments sections.
J) If we could start from scratch, here’s what I think we would do:
*Create a system that enables content producers to negotiate with aggregators (整合者) and search engines to get a royalty whenever their content is used, like ASCAP has negotiated for public performances and radio airings of its members’ works.
*Embed (嵌入) a simple digital wallet and currency for quick and easy small payments for songs, blogs, articles, and whatever other digital content is for sale.
*Encode emails with an authenticated return or originating address.
*Enforce critical properties and security at the lowest levels of the system possible, such as in the hardware or in the programming language, instead of leaving it to programmers to incorporate security into every line of code they write.
*Build chips and machines that update the notion of an internet packet. For those who want, their packets could be encoded or tagged with metadata (元数据) that describe what they contain and give the rules for how it can be used.
K) Most internet engineers think that these reforms are possible, from Vint Cerf, the original TCP/IP coauthor, to Milo Medin of Google, to Howard Shrobe, the director of cybersecurity at MIT. "We don’t need to live in cyber hell," Shrobe has argued. Implementing them is less a matter of technology than of cost and social will. Some people, understandably, will resist any reduction of anonymity, which they sometimes label privacy.
L) So the best approach, I think, would be to try to create a voluntary system, for those who want to use it, to have verified identification and authentication. People would not be forced to use such a system. If they wanted to communicate and surf anonymously, they could. But those of us who choose, at times, not to be anonymous and not to deal with people who are anonymous should have that right as well. That’s the way it works in the real world.
M) The benefits would be many. Easy and secure ways to deal with your finances and medical records. Small payment systems that could reward valued content rather than the current incentive to concentrate on clickbait for advertising. Less hacking, spamming, cyberbullying, trolling, and spewing of anonymous hate. And the possibility of a more civil discourse.
The author thinks the internet should be fixed not because he is afraid of new technologies but because problems arise in it.
选项
答案
B
解析
B段定位句表明,自从柏拉图担心书写技术会危及记忆力和演讲术以来,对新技术产生的忧虑就一直存在。我热爱互联网及其所有的数码衍生物。而我惋惜的足它的衰退。该段第一句中的this指代A)段第一句:我们该修整互联网了。由此推知,作者认为应该修整互联网了,并不是因为他会像柏拉图那样担心新技术,而是因为这项新技术的衰退。题干中的is afraid of对应定位句中的worries about;problems对应定位句中的decline。题干是对定位句的概括,故B)为答案。
转载请注明原文地址:https://kaotiyun.com/show/1Ya7777K
0
大学英语四级
相关试题推荐
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
A、Theknowledgeofteachers.B、Thebehaviorsofstudents.C、Theprinciplesofschools.D、Theintroductionofbooks.A短文提到老师们需要有与
A、Ittastesthesameasthepast.B、Itisnotrefreshingnow.C、Itcan’tcureheadaches.D、Itismuchcheaperthanbefore.C短文提到
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
ToHelptheKids,ParentsGoBacktoSchool[A]Forafewyearsnow,everyparentofanewbornbabyintheSouthFloridadistrict
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
InastepthatshouldhelpmaketheInternetsaferforconsumers,anti-virusgiantSymanteconWednesdaywillintroduceaprotec
随机试题
私人教练在课程销售中常遇到的问题不包括()。
类风湿关节炎易侵犯颈椎时易发生环枢关节半脱位,下列描述中哪项不是半脱位的典型表现
女性,41岁,持续高热伴上腹疼痛4天,巩膜黄染3天入院。体检:高热面容,神志清,血压10/6kPa(75/45mmHg),巩膜黄染,呼吸急促30次/min,心率120次/min,律齐,右上腹压痛明显。周围血象:WBC20×109/L,中性粒细胞0.88。
上颌骨的四个突起分别称为
应用计算机解管网问题是根据管网的结构参数和运行参数求解管网的数学模型一管网稳态方程组。从而可全面了解管网的工作状况,并对管网的()等提供科学依据。
()是整个建设工程项目质量控制的关键阶段。
地壳中含有大量的化学元素,化学元素形成了矿物,矿物组成了岩石。在地壳中已经发现的90多种化学元素中,含量居前两位的元素是()。
21世纪头10年,金砖国家整体经济平均增长率超过8%,远高于发达国家2.6%的平均增长率及4.1%的全球平均增长率,金砖国家在全球GDP中所占份额从2000年的17.0%提升到2010年的25.7%,且将继续提升。2010年金砖国家中人均GDP超过1
根据以下资料,回答下列题。2011年全国农民工总量达到25278万人,增长4.4%。从就业地点看,在直辖市务工的占10.3%,在省会城市务工的占20.5%,在地级市务工的占33.9%,在地级以上大中城市务工的农民工比上年提高1.7个百分点。外出农
应用入侵防护系统(AIPS)一般部署在()。
最新回复
(
0
)