首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、To build powerful software. B、To change our passwords every single day. C、To use our biometric information as passwords. D、To
A、To build powerful software. B、To change our passwords every single day. C、To use our biometric information as passwords. D、To
admin
2018-05-11
36
问题
W: Good evening, everybody. We are entering a period in which you can be expected to talk to machines for the rest of your life. Since the field of artificial intelligence(AI)was officially founded in the mid-1950s, people have been predicting the rise of conscious machines. Today we have inventor and futurist Ray Kurzweil here: Ray Kurzweil has recently been hired to be a director of engineering at Google.
M: Thank you, hostess.(1)We don’t stop to think about it, but if you really want to freak yourself out and you own a cell phone, go to Google and look up your personal information—every single place that you have been since you have been online. We don’t think about those digital bread crumbs. There are lots of third parties out there that are happily scooping them up and doing something with that data. If you stop to think about it, your phone knows you better and has a more intimate relationship with you than your loved one.
W: Sounds rather intimidating.
M: The thing that’s coming is artificial intelligence. It won’t just be you talking to a machine. A lot of it is going to be invisible, and it’s going to make our lives easier. It’s going to allow scientists to leapfrog ahead in their research. And I do believe that, within my lifetime, life as we know it on this planet is probably going to look a little bit different than it is today.(2)There are some really interesting bio information tools that are coming to market.
W: So, how can we prevent against hackers?
M:(3)No matter how hard we try to tell people, you have got to change your passwords, most people don’t change their passwords. What if we no longer had passwords, but instead we are using our own biometric information? You’re probably already doing that if you have a newer phone. You’re using your thumbprint as a way to make payments. Some of the interesting things on the horizon are things like heat maps. All of the capillaries of your face are in very slightly different places, which means that your face sort of gives off this unique heat map. And that unique heat map is one way that we can authenticate you.
W: This is quite innovative, but what is the biggest challenge of this technology?
M: One of the challenges with this technology is that,(4)as it becomes more sophisticated, it also becomes more hidden. If you look under the hood of a modern car, you see what looks like a flat surface. Not every person who drives a car needs to be Lewis Hamilton’s F1 pit crew boss, but I do think it’s dangerous for us to continue going forward without having some of that lexicon.
W: What do you mean by that lexicon?
M: We have to be able to have conversations with each other and with the people creating these devices, because, if we can’t have the conversations, then we can’t ask the questions. And if we can’t ask the questions, the problem is that, 10 years into the future, we’re going to look back at this moment in time and wish that we had done things differently.
W: But your company, whose motto is "Don’t be evil," claims it can address potential concerns about its work in AI by conducting research in the open and collaborating with other institutions.(5)In terms of privacy concerns, specifically, Google goes above and beyond to make sure everyone’s information is safe and secure, calling data security a "top priority. "
M: Let’s hope so.
This is the end of the first interview. Questions 1 to 5 are based on what you have just heard.
1. According to the man, how would we feel if we go to Google and look up our personal information?
2. According to the man, what are coming to market?
3. To prevent against hackers, how will new technology help us?
4. What is the biggest challenge of the new technology?
5. What is Google’s ethics in terms of privacy concerns?
选项
A、To build powerful software.
B、To change our passwords every single day.
C、To use our biometric information as passwords.
D、To use the heat map to pay.
答案
C
解析
本题考查的是新技术可以如何帮助我们防止黑客入侵。当女子问到我们如何防止黑客入侵时,男子回答道,“No matter how hard we try to tell people,you have got to change your passwords,most people don’t change their passwords.What if we no longer had passwords,but instead we are using our own biometric information?”由此可以推断,使用生物信息做密码是防止黑客人侵的关键。因此答案为[C]。
转载请注明原文地址:https://kaotiyun.com/show/3WoK777K
0
专业英语八级
相关试题推荐
PASSAGEFOURWhatdeterminescountries’beingrankedinto3tiers?
StudyActivitiesinUniversityInordertohelpcollegeanduniversitystudentsintheprocessoflearning,fourkeystudya
CulturalDifferencesbetweenEastandWestI.FactorsleadingtotheculturaldifferencesA.Differentculture【T1】______【T1】___
CulturalDifferencesbetweenEastandWestI.FactorsleadingtotheculturaldifferencesA.Differentculture【T1】______【T1】___
PASSAGEFOURWhatcanthesuccessofGooglebeascribedtoaccordingtothefirstparagraph?
NoEnglishmanbelievesinworkingfrombooklearning.Hesuspectseverythingnew,anddislikesit,unlesshecanbecompelledby
PASSAGETHREEWhatisthescientists’attitudetowardsthestudypublishedinScience?
A、ThisThursday.B、RightAftertheinterviewoftwomoreapplicants.C、Withinaweek.D、Itisnotmentioned.C对话的最后,面试官提到,他们公司的做
SomeTheoriesofHistoryI.TheproblemsofunderstandinghistoryHistorywithwrittenrecords:therecordsmaybe【T1】______
我到这个城市出差,昨天下午下榻在这家旅馆。他和他的妻子就住在我的隔壁。这家旅馆的条件不太好,隔墙很薄,一点都不隔音。他们说话的声音总是很清晰地传过来。很快,我就凭直觉得到了一个印象,那女人很懒,不管什么事情都爱支使丈夫:给我倒杯水:给我找双袜子……
随机试题
南齐()的“六法”论原是绘画优劣的批评准则,后来成为中国画的经典理论和实践指导。[天津2019]
夏秋季发病较多的传染病有
点P沿图4-36所示轨迹已知的平面曲线运动时,其速度大小不变,加速度a应为()。
控制性施工进度计划编制的主要目的是通过计划的编制,以对_____所规定的施工进度目标进行再论证。()
监理实施细则应在相应工程施工开始前由专业监理工程师编制,并报()审批。
统计职业道德的核心内容是()。
贝尼尼是17世纪意大利________风格中最著名的艺术家。
《治安管理处罚法》规定的违反治安管理行为范畴包括()。
YouhavebeenabsentfromProf.Smith’sclassfortwoweeks.Writealettertohimto1)stateyourreasonsforabsence,and2)
A、Howmostmathematicianswork.B、Accidentaldiscoveryabouttheearth’sshape.C、Howtotrackanorbit.D、Howastronautsuseco
最新回复
(
0
)