首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
admin
2012-03-27
113
问题
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has (1) across the Web.
Can privacy be preserved (2) bringing safety and security to a world that seems increasingly (3) ?
Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a (4) to make the Web a safer place a "voluntary trusted identity" system that would be the high-tech (5) of a physical key, a fingerprint and a photo ID card, all rolled (6) one. The system might use a smart identity card, or a digital credential (7) to a specific computer, and would authenticate users at a range of online services.
The idea is to (8) a federation of private online identity systems. User could (9) which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license (10) by the government.
Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to (11) just once but use many different services.
(12) , the approach would create a "walled garden" cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of a (13) community.
Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with (14) ,trusting the identities of each other and the identities of the infrastructrue (15) which the transaction runs".
Still, the administration’s plan has (16) privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would (17) be a compulsory Internet "drive’s license" mentality.
The plan has also been greeted with (18) by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt would still leave much of the Internet (19) . They argue that all Internet users should be (20) to register and identify themselves, in the same way that drivers must be licensed to drive on public roads.
选项
A、invited
B、appointed
C、allowed
D、forced
答案
D
解析
选项[A]invited表示“邀请”;选项[B]appointed表示“任命,指定”;选项[C]allowed表示“允许,准许”;选项[D]forced表示“强迫,强力推动”,首先根据意思排除[A]和[B],网络用户注册并确认身份本来就是文中赞成的观点,进而排除[C],正确选项为[D]。
转载请注明原文地址:https://kaotiyun.com/show/Aje4777K
0
考研英语二
相关试题推荐
StudythefollowingdrawingcarefullyandWriteanessayinwhichyoushould:1)describethedrawing,2)interpretthemeaning
Theword"this"(Paragraph1)probablyrefersto______.Thepotentialforhazardousweedsdevelopingfromgeneticallymodified
Idon’tlikefootball,butsomepeopleare______aboutit,whichisbeyondmycomprehension.
Thelongestbullruninacenturyofart-markethistoryendedonadramaticnotewithasaleof56worksbyDamienHirst,Beauti
Thelongestbullruninacenturyofart-markethistoryendedonadramaticnotewithasaleof56worksbyDamienHirst,Beauti
Pricesarcsky-high,withprofitstomatch.Butlookingfurtherahead,theindustryfaceswrenchingchange,saysanexpertofen
TheUnitedStateshashistoricallyhadhigherratesofmarriagethanthoseofotherindustrializedcountries.Thecurrentannual
Wearelivinginoneofthoseperiodsinhumanhistorywhicharemarkedbyrevolutionarychangesinallofman’sideasandvalue
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
Thequestioningoftheroleofthepubliegalleryisnotanewphenomenon.Itissomethingthathasbeenarguedoversinceitsv
随机试题
A.超高温消毒法B.低温保藏法C.高温灭菌法D.巴氏消毒法E.γ射线消毒法使繁殖型和芽孢型细菌被消灭,起到长期保藏食品的目的的杀菌保藏方法是()
女,58岁。下唇糜烂。临床检查:下唇唇红有1cm×1.2cm血痂,中央凹陷,边缘微隆,有放射状白色短条纹。下列不是该病的病理表现的是
六腑的主要功能是
育才中学委托利达服装厂加工500套校服,约定材料由服装厂采购,学校提供样品,取货时付款。为赶时间,利达服装厂私自委托恒发服装厂加工100套。育才中学按时前来取货,发现恒发服装厂加丁的100套校服不符合样品要求,遂拒绝付款。利达服装厂则拒绝交货。下列哪些说法
下列对供热管网的分类错误的是()。
甲股份有限公司(以下简称“甲公司”)2×20年为实现产业整合,减少同业竞争实施了一项企业合并,与该项企业合并及合并后相关的交易事项如下: (1)3月20日,甲公司与其控股股东(P公司)及独立第三方S公司分别签订股权购买协议,从P公司购买其持有的乙公司90
计算机主频的周期是指()。
Asobviousasitmaysound,thetruthistherearealotofbusinessesoutthere.Theoddsofnothavinganycompetitionarenex
已知字符‘A’的ASCII代码值是65,字符变量c1的值是‘A’,c2的值是‘D’。则执行语/ffJprintf(“%d,%d.t,c1,c2—2);的输出结果是()。
在长度为n的有序线性表中进行二分查找,最坏情况下需要比较的次数是()。
最新回复
(
0
)