首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
admin
2017-01-17
8
问题
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the bans of the Guardian and other media organisations involved in this story when a rogue copy of Der Spiegel accidentally went on sale in Basle, Switzerland. Someone bought it, realised what they had, and began scanning the pages, translating them from German to English and posting up-dates on Twitter. It would seem digital data respects no authority, be it the Pentagon, WikiLeaks or a newspaper editor.
Individually, we have all already experienced the massive changes resulting from digitisation. Events or information that we once considered momentary and private are now accumulated, permanent, public. Governments hold our personal data in huge databases. It used to cost money to disclose and distribute information. In the digital age it costs money not to.
But when data breaches happen to the public, politicians don’t care much. Our privacy is expendable. It is no surprise that the reaction to these leaks is different. What has changed the dynamic of power in a revolutionary way isn’ t just the scale of the databases being kept, but that individuals can upload a copy and present it to the world.
To some this marks a crisis, to others an opportunity. Technology is breaking down traditional social barriers of status, class, power, wealth and geography—replacing them with an ethos of collaboration and transparency.
Leaks are not the problem; they are the symptom. They reveal a disconnect between what people want and need to know and what they actually do know. The greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a strong managing system for the public to access important information.
We are at a key moment where the visionaries in the leading position of a global digital age are clashing with those who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater transparency and participation. It used to be that a leader controlled citizens by controlling information. Now it’s harder than ever for the powerful to control what people read, see and hear. Technology gives people the ability to band together and challenge authority. The powerful have long spied on citizens as a means of control, now citizens are turning their collected eyes back upon the powerful.
This is a revolution, and all revolutions create fear and uncertainty. Will we move to a New Information Enlightenment or will the strong resistance from those who seek to maintain control no matter the cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy for the next century, so it would be well if our leaders responded to the current challenge with an eye on the future.
The author’s method to overcome leaks indicates that
选项
A、a chain is no stronger than its weakest link.
B、it is better to guide than to block.
C、forbidden fruit is the sweetest.
D、it is better to be late than never.
答案
B
解析
推断题。作者在第五段末句提出克服泄密的方法,确保一个便于公众获得重要信息的强劲的管理体制,即与其狼狈地对信息进行封堵,不如提倡一个便于获取信息的平台,并对其进行有力管理,进而引导公众态度,故B正确。作者并没指出克服泄密应该从哪一个具体环节入手,A项无中生有。C项反向干扰:作者提倡的是信息公开,而非封闭信息(forbidden)。D项作者并未表达“早就应该预防泄密事件的发生”之意,“迟做”无从谈起。
转载请注明原文地址:https://kaotiyun.com/show/f1EZ777K
0
考研英语一
相关试题推荐
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
WritealettertotheOfficeofPropertyManagementofyourcommunity,togiveyouradviceonhowtoimprovecommunitysecurity.
In1784,fiveyearsbeforehebecamepresidentoftheUnitedStates,GeorgeWashington,52,wasnearlytoothless.Sohehireda
ThedecisionoftheNewYorkPhilharmonictohireAlanGilbertasitsnextmusicdirectorhasbeenthetalkoftheclassical-mus
Datahasahabitofspreading.ItslipspastmilitarysecurityanditcanalsoleakfromWikiLeaks.Itevenslippedpasttheban
Beforeabigexam,asoundnight’ssleepwilldoyoumoregoodthanporingovertextbooks.That,atleast,isthefolkwisdom.A
Homelandsecurityisastrangebeast.Governmentswillhappilyspendbillionsofdollarsfightingforeignwarsandmakingtheli
随机试题
整理后的蔬菜先放入浓度为________的食盐溶液中浸泡约5min,然后用清水冲洗净虫卵。
每周应对柴油机消防水泵启动电池的电量进行检测。()
触诊乳房的方法哪项不规范
将外毒素转变为类毒素
下列哪些情形下当事人必须先申请复议,对复议决定不服的才能提起行政诉讼?
某企业管理层希望通过新产品生产加强企业的竞争力,该新产品属于高科技新型产品,上市不足3年。公司市场分析人员经过多方努力收集到了前两年的产品市场数据,结合本企业数据库,并根据第3年前三个季度的销售数据推算出今年的年销售数据,见表1—1。企业如
企业编报的财务报表应当以人民币反映。()
北京的甲公司和长沙的乙公司于2015年4月1日在上海签订一买卖合同。合同约定,甲公司向乙公司提供一批货物,双方应于2015年4月10日在厦门履行合同。2015年4月10日,甲公司依约交货后,乙公司拒绝付款。经交涉无效,甲公司准备对乙公司提起诉讼。要求:根
民族精神集中体现了一个民族在一定自然环境和社会历史条件下生存与发展的独特方式,反映了一个民族的心理特征、文化传统和精神风貌,是一个民族赖以生存和发展的精神支柱。中华民族精神的内涵十分丰富,爱国主义是其核心,同时包括了团结统一、爱好和平、勤劳勇敢、自强不息在
我们公司的目标是满足和超过行业的要求和用户的期望。
最新回复
(
0
)