首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Strategies to deal with spam e-mails. B、People’s view on the Internet. C、Phenomenon of phishing. D、ISP technology. A此题询问主题。男士这
A、Strategies to deal with spam e-mails. B、People’s view on the Internet. C、Phenomenon of phishing. D、ISP technology. A此题询问主题。男士这
admin
2017-03-07
48
问题
W: You have spoken to us about how we can prevent our e-mail address falling into the wrong hands. What can we do to alleviate the spam problem if this has already occurred, beyond creating a new account, which may not be practical for all of our listeners? Is there anything we can do to fight back against the spammers?
M: Sure. There are a variety of handy antispam tools out there on the market. Your ISP, that is, your Internet service provider, will most likely have one of the main antispam filters active on all their users’ accounts.
W: Hmmm, tell me about these filters. I think I need to get one.
M: Without going into too much technical detail, spam filter software will analyze all incoming messages and flag, divert or delete e-mails that it considers to be spam. This may be because the message contains certain words—I think we all know what types of words I’m talking about here. Or the e-mail may have other qualities which mark it out to be spam in all likelihood, such as large blue or red font, lack of return address, too much capitalization and a whole list of other considerations.
W: But doesn’t that mean we have to ask our friends never to write e-mails to us in blue? I would be very concerned about legitimate e-mails being deleted...
M: Oh, absolutely! An antispam filter will only flag an e-mail message as spam if several of these factors are found to be present in a particular message. If your friends choose to write to you in blue, but the message is otherwise perfectly normal, it will not be considered spam. These filters are great because users are often given control over the sensitivity level, but that’s not true if you use one of the huge national ISPs such as AOL
W: We now move on to an issue we mentioned at the beginning of the program—phishing. What is it and how can we best protect ourselves from it?
M: First of all, we should explain that even though the pronunciation is the same, this variety of phishing is spelt with a "PH" and not an "F". Right, phishing is quite a recent phenomenon but can be very damaging if users are not very aware of the dangers that exist. If you get an e-mail that claims to be from, let’s say, your bank and asks you to click on a link, visit a site and enter information such as your account number, password, or username, you can be certain that you have been a victim of phishing.
W: David, it’s been very informative to have you here speaking to us today. A little understanding of these issues can help us to see the world of e-mail and the Internet isn’t so sinister after all. Please come back and see us soon, won’t you?
M: I’d be delighted. Thanks very much for inviting me to speak to your listeners.
6. What can we learn from the beginning of this part’s interview?
7. According to David Akris, what is spam filter software?
8. What messages can be considered to be spam?
9. Which situation means you may have gotten into phishing?
10. What is David Akris’ focus in the interview?
选项
A、Strategies to deal with spam e-mails.
B、People’s view on the Internet.
C、Phenomenon of phishing.
D、ISP technology.
答案
A
解析
此题询问主题。男士这次访谈主要说了对付垃圾邮件的一些策略,可判断A正确。其他的三项都只是个别信息,无法概括主题。
转载请注明原文地址:https://kaotiyun.com/show/DnzK777K
0
专业英语八级
相关试题推荐
EvaluatingSpeakingSpeakingisacomplexactwithmanydifferentelementsinteractingtoproduceeffectivecommunication,
Accordingtothenewsitem,peoplecangetthefollowinghelpfromtheHIV/AIDScampsEXCEPT
AccordingtoAlan’scoverstory,whatisthedifferenttraitbetweenabossandmostpeople?
StrategiesforWritingaLiteratureReviewAliteraturereviewdiscussespublishedinformationinaparticularsubjectarea.
StrategiesforWritingaLiteratureReviewAliteraturereviewdiscussespublishedinformationinaparticularsubjectarea.
HowtoGetaPaperPublishedI.Prerequisitedoingmass【B1】______【B1】______collectingmassinformationanddataII.Thingsy
ConsiderationsofLearning-centeredTeachingI.IntroductionA.goalofmostcourses:toenhancestudents’understanding—differ
Changesinthetechnologyofcommunicationareoccurringsorapidlythatwehumanbeingsnowmovethroughacloudofmessagesa
Changesinthetechnologyofcommunicationareoccurringsorapidlythatwehumanbeingsnowmovethroughacloudofmessagesa
随机试题
肾小球滤过压等于
下列关于子宫下段的叙述中,哪项不正确
在测量基础代谢率时,正确的做法是
患儿营养不良时应用苯丙酸诺龙的主要作用是
工期优化步骤有以下内容:①确定各关键工作能缩短的时间;②找出关键线路及关键工作;③确定应优先缩短持续时间的关键工作;④按要求工期计算应缩短的时间。其顺序为()。
项目与风险情况有关联是因为()。
根据《文物保护法》,盗掘古墓葬构成犯罪,应依法追究刑事责任。()
DNA是人类进行亲子鉴定的主要依据,下面关于DNA的组成,说法正确的是:
有人说首长负责制是否定民主集中制,请谈谈你的看法。
甲(40岁)是某市肉联厂职工。2010年7月5日下午3时许,甲到姐姐家,提出要带外甥乙(9岁)去附近水库游泳。乙的母亲即甲的姐姐告诉甲,乙不会游泳,叮嘱甲要照看好乙。约4时许,甲带乙到达水库,租了2个救生罔,2人一起下水游泳约1小时,而后一起上岸休息。休息
最新回复
(
0
)