首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Read the following text and answer questions by finding information from the right column that corresponds to each of the marked
Read the following text and answer questions by finding information from the right column that corresponds to each of the marked
admin
2012-11-11
137
问题
Read the following text and answer questions by finding information from the right column that corresponds to each of the marked details given in the left column. There are two extra choices in the left column.
Shoppers who have flocked to online stores for their holiday shopping are losing privacy with every mouse click, according to a new report. The study by the Washington-based Electronic Privacy Information Center scrutinized privacy policies on 100 of the most popular online shopping sites and compared those policies with a set of basic privacy principles that have come to be known as "fair information practices".
The group found that none of the 100 Websites met all of the basic criteria for privacy protection, which include giving notice of what information is collected and how it is used, offering consumers a choice over whether the information will be used in certain ways, allowing access to data that give consumers a chance to see and correct the information collected, and instituting the kind of security measures that ensure that information won’t fall into the wrong hands.
"This study shows that somebody else, other than Santa, is reading your Christmas list," said Jeff Chester, executive director of the Center for Media Education, which also worked on the survey.
The online privacy of children is protected by Federal Trade Commission rules, but adults do not share the same degree of privacy protection. The movement, like the online shopping industry, favors self-regulation over imposition of further movement restrictions on electronic commerce. Marc Rosenberg, executive director of the privacy group, said the study shows that self-regulations have failed, "We need legislation to enforce fair information pretences," he said. "Consumers are at greater risk than they were in 1997," when the group released its first report.
The survey also asked whether the 100 Websites used "profile-based" advertising, and whether the Websites incorporate "cookies" technology, which gives Websites basic information on visitors. Profiling is the practice of gathering in then used to create targeted advertising on Websites. All but 18 of the top shopping sites did display a privacy policy, a major improvement over the early days of electronic commerce, when such policies were scarce.
But that did not satisfy the privacy group. "Companies are posting privacy policies, but these policies are not the same thing as fair information practices," Rosenberg said.
The sites also did not perform well by other measures, the group said it found that 35 of the sites feature profile-based advertising, and 87 percent use cookies. The group concluded that the phonies that were posted "are typically confusing, incomplete, and inconsistent". The report, "Surfer Beware III: Privacy Policies without Privacy Protection", is the third such survey by the group, it called for further development of technologies that help consumers protect their privacy and even anonymity (匿名) when exploring the Internet.
A. the online shopping industry should regulated themselves
B. offer Websites basic information of those who visit the sites
C. new technology should be developed to protect privacy of visitors on the sites
D. electronic commerce must be highly restricted by government
E. their online privacy are protected by Federal Trade Commission rules
F. privacy policies on 100 of the most popular online shopping sites
G. allow consumers to access to data and correct the information collected
The report "Surfer Beware III" insisted that ______.
选项
答案
C
解析
首先,从语法上看,题干要求寻找一个完整的句子做insist的宾语从句。C、D是显然满足要求的。注意到题干中有个专有名词“Surfer Beware III”,通过回文定位,原文中的描述是:The report, "Surfer Beware III: Privacy Policies without Privacy Protection," is the third such survey by the group, it called for further development of technologies that help consumers protect their privacy and even anonymity(匿名)when exploring the internet。原文最后一句与选项C是对应的。因此,答案就是选项C。
转载请注明原文地址:https://kaotiyun.com/show/cVe4777K
0
考研英语二
相关试题推荐
Thingswentwellforhimduringhisearlylifebutinmiddleagehis______seemedtochange.
Heisquitesurethatit’s______impossibleforhimtofulfillthetaskwithintwodays.
Mobiletelecommunications______isexpectedtodoubleinShanghaithisyearasaresultofacontractsignedbetweenthetwoco
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【1】thatbusinesseswerestill
Officejobsareamongthepositionshardesthitbycompumation.Wordprocessorsandtypistswillloseabout93,000jobsoverthe
Isitpossiblethattheideaswehavetodayaboutownershipandpropertyrightshavebeensouniversalinthehumanmindthatit
Theroleofgovernmentsinenvironmentalmanagementisdifficultbutinescapable.Sometimes,thestatetriestomanagetheresou
Thequestioningoftheroleofthepubliegalleryisnotanewphenomenon.Itissomethingthathasbeenarguedoversinceitsv
FormostthinkerssincetheGreekphilosophers,itwasself-evidentthatthereissomethingcalledhumannature,somethingthat
Scientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteria.TheChineserese
随机试题
调车作业由()单一指挥。
采用爆破排淤填石法改良地基时,爆破排淤设计一定要根据堤身设计断面要求设计合理的爆破参数,如包括线药量、单孔药量、布药孔数、()、布药位置、药包在泥面下埋设深度、爆破施工水位等。
三全控制管理是来自于TQC的思想,对此,下列叙述正确的是()。
我国期货公司从事的业务类型不包括()。
企业把一个现有的品牌名称使用到一个新类别的产品上,称为()。
“官窑”的名称最早见于南宋顾文荐的()中。
试论法的作用的局限性。
A、 B、 C、 D、 C
下面是数据段,执行MOV BX,B指令后,BX寄存器中的内容是( )。 DSEG SEGMENT ADB,1234, B DW A DSEG ENDS
某计算机的CPU主频为500MHz,CPI为5(即执行每条指令平均需5个时钟周期)。假定某外设的数据传输率为0.5MB/s,采用中断方式与主机进行数据传送,以32位为传输单位,对应的中断服务程序包含18条指令,中断服务的其他开销相当于2条指令的执行时间。请
最新回复
(
0
)