首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
1 White-collar copycats may be less inclined to pilfer the well-chosen words of others now that software designed to ferret
1 White-collar copycats may be less inclined to pilfer the well-chosen words of others now that software designed to ferret
admin
2010-03-25
79
问题
1 White-collar copycats may be less inclined to pilfer the well-chosen words of others now that software designed to ferret out plagiarism is moving out of academia and into the business world. For years, educators at colleges and universities have marshaled software tools to ensure that their students’ work is original. Now, tainted by scandals or leery of the Internet’s copy-enabling power, a growing number of newspapers, law firms and other businesses are using data-sifting tools that can cross-check billions of digital documents and swiftly recognize patterns in just seconds.
2 Unlike Google and other search engines that find matches to typed-in key words, an advanced plagiarism-detection service such as iParadigms LLC’s makes a digital fingerprint of an entire document and compares it against material on the Internet and in other sources, including proprietary academic and media databases. Even the U.N. Security Council has begun to protect its credibility this way, using iParadigm’s technology since last fall to ensure the originality of reports by its researchers and freelance writers.
3 Oakland, Calif.-based iParadigms started in 1996 with a computer program to help researchers at the University of California, Berkeley inspect undergraduates’ papers. Today, its Turnitin plagiarism-detector is used by about 2,500 high schools and colleges in the United States and 1,000 more abroad. It launched a commercial version, iThenticate, in January.
4 Other plagiarism-detection providers, including Glatt Plagiarism Services, MyDropBox LLC, and CFL Software Development also report growing business outside the educational sector. New clients include companies that produce instruction or training materials, attorneys searching for copyright violations, Web sites and police and military agencies that check officers’ applications for promotions.
5 Few of these businesses are willing to talk about using these tools. Many insist that the software makers shield their identities and keep mum about any transgressions that are exposed. Last year, one publisher turned to iParadigms when it investigated—and subsequently affirmed—rumors that an accomplished textbook author had plagiarized other sources. Sworn to secrecy, iParadigms president John Barrie said he watched in disbelief as the publisher quietly revised later editions, leaving the author’s reputation intact.
6 "But I see a lot of plagiarism everyday," Barrie said. "Most authors, whether a student or professional author, think the odds of being found out are so remote that they’ll play the odds and think they’re just fine."
7 IParadigms charges universities a $500 annual licensing fee plus 60 cents per full-time student. Business customers pay $1,000 a year and $10 for each page submitted for screening. Newspapers face different charging options based on word count or circulation.
8 A different program, WCopyfinder, was employed by USA Today as it probed the work of its embattled former reporter Jack Kelley. The free program compares strings of words only from preselected documents. IThenticate and MyDropBox, by contrast, are Web-based tools. Users upload documents to the Web sites; the services troll the Internet and other proprietary databases, such as Lexis-Nexis or ProQuest, for any sign of unoriginal work; then they produce reports showing matches. IThenticate also combs its archive of Internet pages, which grows by 40 million pages a day.
9 Clearly, plagiarism is a growing problem. In a survey of 30,000 undergraduates at 34 colleges, 37 percent admitted committing cut-and-paste plagiarism using the Internet, up from 10 percent in 1999. Only 20 percent of their professors use plagiarism-detection tools, according to the survey by Rutgers University professor Don McCabe, founder of the Center for Academic Integrity.
10 Plagiarism detectors can be relatively cheap insurance against intellectual property sins, but many businesses and even educators remain reluctant to use them. Some fear lawsuits if they accuse someone of cheating. And deciding what amounts to actual plagiarism remains a judgment call that humans must make, creators of the software say.
By "white-collar copycats" (Para. 1), the author refers to ______.
选项
A、students
B、educators
C、business employers
D、business employees
答案
D
解析
本题为细节理解题。据第l段第1句中的white-collar和into the business world可排除A和B。据第2段最后1句,可以排除C,确定D。
转载请注明原文地址:https://kaotiyun.com/show/QJqO777K
0
专业英语八级
相关试题推荐
TheInternetisanexcellentsourceforfindingmanytypesofinformationandforkeepingupwithnewdevelopmentsintheworld.
Takingonaleadershiproleforthefirsttimeistough.Thereisalwayspressureonyoutodotherightthings,andtobeseen
Weallhaveproblemsandbarriersthatblockourprogressorpreventusfrommovingintonewareas.Ourproblemsmightincludet
Goodafternoon!Thetopicfortoday’slectureis"The’ClickandGo’Generation"which,ofcourse,referstotoday’steenagers.
Canyouspotagoodmarriage?IwasprettysureIcould,startingwithmyown.MyhusbandandIrarelyargued,wehadsimilarca
Theterm"Americandream"wasfirstusedin【B1】______inanovelwrittenbyHoratioAlger:RaggedDick.Themessagewas:Nomatte
Theterm"Americandream"wasfirstusedin【B1】______inanovelwrittenbyHoratioAlger:RaggedDick.Themessagewas:Nomatte
Theterm"Americandream"wasfirstusedin【B1】______inanovelwrittenbyHoratioAlger:RaggedDick.Themessagewas:Nomatte
SuicidebombersinIraqhavestagedadeadlysurgeoftheirown,strikingthreetargetsonMondays—includingthehighlyfortifi
AfterTheAdventuresofTomSawyer,TwaingivesaliteraryindependencetoTom’sbuddyHuckinabookentitled______.
随机试题
NobodybutSmithandJohn________inthelabyesterdayafternoon.
甲国公民大卫到乙国办理商务,购买了联程客票搭乘甲国的国际航班,经北京首都国际机场转机到乙国。甲国与我国没有专门协定。根据我国有关出入境法律,下列判断正确的是:(卷一/2010年第98题)
乘数原理把投资变动看作()。
下列关于突发事件处置中公安机关的职责分析表述正确的有()。
谈谈你对“交警和司机交换岗位”的看法。
一个研究员发现免疫系统活性低的人在精神健康测试中比正常和高免疫系统活性的人得分低。该研究员从试验中得出结论:免疫系统不但能保护人们免遭身体疾病,也能保护人们免遭精神疾病。以下哪项如果正确,将对该研究员的结论产生最严重的质疑?
脚本漏洞主要攻击的是__________________。
运行下列程序段,显示的结果是()。a=Instr(5,"Hello!Beijing.","e")b=Sgn(3>2)c=a+bMsgBoxc
Whichofthefollowingfeaturesiscommontomostcapitalmarketinstruments?______.
Koreanpeoplehavegotintothewesternhabitof______appointmentsbeforevisitingafriend.
最新回复
(
0
)