首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
We’re in the midst of a global interconnection that is expected to have consequences at least as profound. What would happen if
We’re in the midst of a global interconnection that is expected to have consequences at least as profound. What would happen if
admin
2019-07-19
32
问题
We’re in the midst of a global interconnection that is expected to have consequences at least as profound. What would happen if all the information stored on the world’s computers were accessible via the Internet to anyone?
Ask Dr. Denise Nagel, executive director of the National Coalition for Patient Rights, about medical privacy. "Small-scale privacy atrocities take place every day. The technology is getting a-head of our ethics," says Nagel.
【R1】______Then, even more than today, the citizenry instinctively loathed the computer and its injunctions against folding, spindling, and mutilating. The public rebelled, and Congress took up the question of how much the government and private companies should be permitted to know a-bout us.
【R2】______The first Fair Credit Reporting Act, passed in 1970, overhauled what had once been a secret, unregulated industry with no provisions for due process. The new law gave consumers the right to know what was in their credit files and to demand corrections. Other financial and health privacy acts followed, although to this day no federal law protects the confidentiality of medical records.
The public and private sectors took two very different approaches. Congress passed legislation requiring that the government tell citizens what records it keeps on them while insisting that the information itself not be released unless required by law. The private sector responded by letting each industry—credit-card companies, banking, insurance, marketing, advertising—create its own guidelines.
【R3】______In the old days, information stored in government databases was relatively inaccessible. Now, however, with PCs on every desktop linked to office networks and then to the Internet, data that were once carefully hidden may be only a few keystrokes away.
Kevin Kelly, executive editor of Wired magazine, says: " We think that privacy is about information, but it’s not—it’s about relationships. " There was no privacy in the traditional village or small town: everyone knew everyone else’s secrets. And that was comfortable. "What’s gone out of whack is we don’t know who knows about us anymore. Privacy has become asymmetrical. "
【R4】______And not surprisingly, he and others points out that what technology has taken, technology can restore. The idea is to allow computer users to decide how much information they want to reveal while limiting their exposure to intrusive marketing techniques. Website entrepreneurs learn about their customers’ tastes without intruding on their privacy.
【R5】______ Many office electronic-mail systems warn users that the employer reserves the right to monitor their e-mail. "Technology has outpaced law," says Marc Rotenberg, director of the Washington-based Electronic Privacy Information Center. Rotenberg advocates protecting the privacy of e-mail by encrypting it with secret codes so powerful that even the National Security Agency’s supercomputers would have a hard time cracking it. Such codes are legal within the United States but cannot be used abroad——where terrorists might use them to protect their secrets—without violating U. S. export laws.
Rotenberg thinks we need a new government agency——a privacy agency——to sort out the issues. "We need new legal protections," he says, "to enforce the privacy act, and to act on behalf of privacy interests. " Wired’s Kelly disagrees. "A federal privacy agency would be disastrous! The answer to the whole privacy question is more knowledge," he says. "More knowledge about who’s watching you. More knowledge about the information that flows between us. "
Questions 61 to 65
Choose from the sentences A - G the one which best fits each gap of 61 -65. There are two extra sentences which you do not need to use.
A. But worse things may already be happening.
B. Our culture is undergoing a kind of mass identity crisis, trying to hang on to a sense of privacy and intimacy in a global village of tens of millions.
C. The result was a flurry of new legislation that clarified and defined consumer and citizen rights.
D. That approach worked—to a point, when mainframes started giving way to desktop computers.
E. Many online consumers, however, are skittish about leaving any footprints in cyberspace.
F. It all started in the 1950s, when the US government began entering records on big mainframe computers, using nine-digit identification numbers as data points.
G. The trick, says Kelly, is too restore that balance.
【R3】
选项
答案
D
解析
选项D指出“该方法在一定程度上起了作用,大型主机开始让步于台式电脑”,thatapproach指的是上段介绍的私营机构采取的方法。该空之后指出,过去储存在政府数据库里的数据相对来说难以获得,而现在随着个人电脑和网络的发展,那些曾经仔细隐藏的数据可能敲几下键盘就可以得到了。可见D项起到承上启下的作用。
转载请注明原文地址:https://kaotiyun.com/show/0hfK777K
本试题收录于:
A类竞赛(研究生)题库大学生英语竞赛(NECCS)分类
0
A类竞赛(研究生)
大学生英语竞赛(NECCS)
相关试题推荐
LINDA:Lindawantsthecollegetoofferbetteradviceon【D1】______.Studentsneedmoreinformationaboutjobs【D2】______.Shethi
ThePulitzerPrizesforAmericanwritingareawardedeachyearbythetrusteesof______.
AlaborarbitratorinShanghaihasorderedglobalcomputergiantIBMtopay57,000yuan($8,300)incompensationtoanemployee
PeopleintheUnitedStatesinthenineteenthcenturywerehauntedbytheprospectthatunprecedentedchangeinthenation’sec
Themajorpartofmychildhoodwasspentinfightingoffterrorofthingswhichdidn’texist,andIdon’tthinkmyfatherever
Accordingtothetheoryofsemantictriangle,awordisnotdirectlyrelatedtothethingitrefersto.Theyareconnectedby___
Aminoritylanguageisoftenput______,foritlivesintheshadowofaculturallydominantlanguage,forexample,Irishin_____
Accordingtothetheoryofsemantictriangle,awordisnotdirectlyrelatedtothethingitrefersto.Theyareconnectedby___
Thenovelfromwhich"allmodernAmericanliteraturecomes"refersto______.
随机试题
双开门落地式交接箱安装在人行道侧面线边时,箱体应距人行道侧面线(),确保操作人员站在人行道上工作。
企业为谋求生存和不断发展所做出的总体性和长远性的谋划、方略就是指
A,儿童B,青少年C,青壮年D,老年E,妇女肱骨上端骨骺分离多见于
李某因要报考研究生,欲向单位请假复习,遂找到其中学同学、县医院的执业医师王某,请王某为其开具病假条。王某为李开出了“病毒性心肌炎,全休1个月”的诊断证明书。对于王某的行为,县卫生局可以给予
患者,女性,22岁。头部受伤3小时入院,意识清楚。查体时发现:鼻腔乳突区瘀斑,外耳道有血性脑脊液流出。考虑患者为
在某设备工程网络计划中,已知工作M没有自由时差,但总时差为5d,设备监理工程师检查实际进度时发现该工作的持续时间延长了4d,说明此时工作M的实际进度( )。
我国通常以日历作为企业的会计年度,即以公历()为一个会计年度。
下列关于财务管理方法的表述中,正确的有()。
在以2015年11月1日零时为标准时点进行的全国1%人口抽样调查中。江苏最终样本量占全省常住人口总数的0.94%。调查显示:2015年11月1日零时江苏常住人口为7973万人。同以2010年11月1日零时为标准时点进行的第六次全国人口普查相比,增加107万
制作一张如下所示的4行5列的表格,各列的宽度是2厘米,并以WD01D.DOC为文件名保存在指定文件夹下。
最新回复
(
0
)