首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、It filters messages into categories. B、It helps to separate junk mails. C、It deletes all the incoming messages. D、It lists all
A、It filters messages into categories. B、It helps to separate junk mails. C、It deletes all the incoming messages. D、It lists all
admin
2018-05-24
66
问题
W: You have spoken to us about how we can prevent our e-mail address falling into the wrong hands. What can we do to alleviate the spam problem if this has already occurred, beyond creating a new account, which may not be practical for all of our listeners? Is there anything we can do to fight back against the spammers?
M: Sure. There are a variety of handy antispam tools out there on the market. Your ISP, that is, your Internet service provider, will most likely have one of the main antispam filters active on all their users’ accounts.
W: Hmmm, tell me about these filters. I think I need to get one.
M: Without going into too much technical detail, spam filter software will analyze all incoming messages and flag, divert or delete e-mails that it considers to be spam. This may be because the message contains certain words—I think we all know what types of words I’m talking about here. Or the e-mail may have other qualities which mark it out to be spam in all likelihood, such as large blue or red font, lack of return address, too much capitalization and a whole list of other considerations.
W: But doesn’t that mean we have to ask our friends never to write e-mails to us in blue? I would be very concerned about legitimate e-mails being deleted...
M: Oh, absolutely! An antispam filter will only flag an e-mail message as spam if several of these factors are found to be present in a particular message. If your friends choose to write to you in blue, but the message is otherwise perfectly normal, it will not be considered spam. These filters are great because users are often given control over the sensitivity level, but that’s not true if you use one of the huge national ISPs such as AOL
W: We now move on to an issue we mentioned at the beginning of the program—phishing. What is it and how can we best protect ourselves from it?
M: First of all, we should explain that even though the pronunciation is the same, this variety of phishing is spelt with a "PH" and not an "F". Right, phishing is quite a recent phenomenon but can be very damaging if users are not very aware of the dangers that exist. If you get an e-mail that claims to be from, let’s say, your bank and asks you to click on a link, visit a site and enter information such as your account number, password, or username, you can be certain that you have been a victim of phishing.
W: David, it’s been very informative to have you here speaking to us today. A little understanding of these issues can help us to see the world of e-mail and the Internet isn’t so sinister after all. Please come back and see us soon, won’t you?
M: I’d be delighted. Thanks very much for inviting me to speak to your listeners.
6. What can we learn from the beginning of this part’s interview?
7. According to David Akris, what is spam filter software?
8. What messages can be considered to be spam?
9. Which situation means you may have gotten into phishing?
10. What is David Akris’ focus in the interview?
选项
A、It filters messages into categories.
B、It helps to separate junk mails.
C、It deletes all the incoming messages.
D、It lists all the potential threats.
答案
B
解析
在谈到反垃圾邮件的软件时,男士提到它能分析收到的信息,对可能是垃圾的邮件加以标识、转移或删除。可见,这种软件能够区分垃圾邮件,选B项。这种软件并没有将信息分类,排除A项。
转载请注明原文地址:https://kaotiyun.com/show/IxoK777K
0
专业英语八级
相关试题推荐
ThingstobeTaughtinEverySchoolI.Introduction:Importanceofstudents’abilitytodealwiththerealworld.A.Speaker’so
(1)Thepoundingrainbeganinthemiddleofthenight.ThepeopleofJackson,Ohioawoketothesoundthenwentbacktosleep.
(1)Thepoundingrainbeganinthemiddleofthenight.ThepeopleofJackson,Ohioawoketothesoundthenwentbacktosleep.
PASSAGETHREEAccordingtothepassage,whatendowstheEnglishparkscenerywithasacredatmosphere?
HowInterpretersWork?I.UnderstandingA.Aboutwordsandexpressions—【T1】______wordsmaybeleftout:【T1】______—Ifnotkno
(1)Mostpeoplehaveexperiencedthefeeling,afterataxingmentalwork-out,thattheycannotbebotheredtomakeanymoredeci
DifferentTypesofLearningI.ThedefinitionoflearningA.AprocessofpeopleexperiencingrelationshipbetweeneventsB.【T1】
Ahigh-contextcultureisacultureinwhichthecontextofthemessageortheactionoraneventcarriesalargepartofits【T1
Foryears,nonprofithospitalshaveshiedawayfromquantifyingtheamountofcharitablecaretheyprovidecommunities.Hospit
VisualPerspectivePerspectiveinartisthewaythatartistsrepresentthree-dimensionalobjectsonthetwodimensionsoftheir
随机试题
载道说
下列有关次级生产力的说法中,不正确的是()
视网膜中央凹
女性,29岁。克罗恩病史5年。近日突然出现剧烈腹痛,伴恶心、呕吐胃内容物,发热,3天未排大便。其原因可能是
对于肝功能不全患者可使用正常剂量的药物是
汉字除了讲究自身架构的完美外,还在乎通篇谋划的美,弄两个不三不四的洋字夹在其中,实在大煞风景,真像吃米饭时,嚼着一粒石子似的硌牙,是一件很不舒服的事情。下列理解不妥当的一项是()。
下列哪些说法是正确的?()
中国共产党同其他任何政党的根本区别是()
传统的数据库基本上是由(38)组成的。(39)在技术和理论上已经成熟,成为当前商用数据库的主流。(40)技术是20世纪80年代中期引入的。目前,多媒体数据库基本上靠与关系模式相结合的(41)来支持。但当数据量大,数据结构复杂时,靠(41)很难适应。当前,在
Completetheflow-chartbelow.WriteNOMORETHANTWOWORDSforeachanswer.
最新回复
(
0
)