首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
admin
2017-12-11
79
问题
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the bans of the Guardian and other media organisations involved in this story when a rogue copy of Der Spiegel accidentally went on sale in Basle, Switzerland. Someone bought it, realised what they had, and began scanning the pages, translating them from German to English and posting up-dates on Twitter. It would seem digital data respects no authority, be it the Pentagon, WikiLeaks or a newspaper editor.
Individually, we have all already experienced the massive changes resulting from digitisation. Events or information that we once considered momentary and private are now accumulated, permanent, public. Governments hold our personal data in huge databases. It used to cost money to disclose and distribute information. In the digital age it costs money not to.
But when data breaches happen to the public, politicians don’t care much. Our privacy is expendable. It is no surprise that the reaction to these leaks is different. What has changed the dynamic of power in a revolutionary way isn’t just the scale of the databases being kept, but that individuals can upload a copy and present it to the world.
To some this marks a crisis, to others an opportunity. Technology is breaking down traditional social barriers of status, class, power, wealth and geography—replacing them with an ethos of collaboration and transparency.
Leaks are not the problem; they are the symptom. They reveal a disconnect between what people want and need to know and what they actually do know. The greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a strong managing system for the public to access important information.
We are at a key moment where the visionaries in the leading position of a global digital age are clashing with those who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater transparency and participation. It used to be that a leader controlled citizens by controlling information. Now it’ s harder than ever for the powerful to control what people read, see and hear. Technology gives people the ability to band together and challenge authority. The powerful have long spied on citizens as a means of control, now citizens are turning their collected eyes back upon the powerful.
This is a revolution, and all revolutions create fear and uncertainty. Will we move to a New Information Enlightenment or will the strong resistance from those who seek to maintain control no matter the cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy for the next century, so it would be well if our leaders responded to the current challenge with an eye on the future.
The author’ s method to overcome leaks indicates that
选项
A、a chain is no stronger than its weakest link.
B、it is better to guide than to block.
C、forbidden fruit is the sweetest.
D、it is better to be late than never.
答案
B
解析
推断题。作者在第五段末句提出克服泄密的方法,确保一个便于公众获得重要信息的强 劲的管理体制,即与其狼狈地对信息进行封堵,不如提倡一个便于获取信息的平台,并对其进 行有力管理,进而引导公众态度,故B正确。作者并没指出克服泄密应该从哪一个具体环节人 手,A项无中生有。C项反向干扰:作者提倡的是信息公开,而非封闭信息(forbidden)。D项 作者并未表达“早就应该预防泄密事件的发生”之意,“迟做”无从谈起。
转载请注明原文地址:https://kaotiyun.com/show/coBZ777K
0
考研英语一
相关试题推荐
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
【C1】______thewayitfeels,lonelinessoftenhasnothingtodowithbeingalone.Forsomepeople,feelingsof【C2】______aresharp
AsValentine’sDayapproaches,manysinglepeoplebegintofeelalittlesorryforthemselves.Onaday【C1】______bycouples,thi
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
ThequestforwisdomisasoldasSocrates,butit’salsoanup-to-the-minuteeconomicindicator.Acontrarianone:whenthings
Datahasahabitofspreading.ItslipspastmilitarysecurityanditcanalsoleakfromWikiLeaks.Itevenslippedpasttheban
TheessentialfunctionsoftheUNaretomaintaininternationalpeaceandsecurity,todevelopfriendlyrelationsamongnations,
随机试题
A.血压升高B.肺毛细血管楔嵌升高C.右房压>肺毛压D.左、右心室压力均升高E.肺静脉压升高男性。56岁。急性胸前区疼痛16h入院。心电图见Ⅱ、Ⅲ、aVF、导联ST弓背向上抬高0.2mV,Ⅰ、Ⅱ、aVF出现Q波;V3~5ST段水
炎症的基本病理变化是
患儿,2岁。因持续高热39.8℃就诊。急诊留观过程中突发意识丧失,眼球上翻,肌肉强直,即刻给予输氧、镇静。此刻首选药物是()
背景材料:某高速公路设计车速120km/h,路面面层为三层式沥青混凝土结构。施工企业为保证工程施工质量,在施工中做了如下工作:(1)选用经试验合格的石料进行备料,严格对下承层进行清扫,并在开工前进行实验段铺筑;(2)沥青混合料
某消防技术服务机构,超越资质许可范围开展消防安全评估业务,消防部门依法责令其改正,并处15000元罚款,该机构到期未缴纳罚款。根据《中华人民共和国行政处罚法》,消防部门可以采取()的措施。
下列各项中属于会计档案的是( )。
A.血管通透性增加B.中性粒细胞趋化作用C.两者均有D.两者均无缓激肽的作用有
设连续型随机变量X的分布函数为其中a>0,ψ(x),φ(x)分别是标准正态分布的分布函数与概率密度,令,求Y的密度函数.
Whenyougetinterruptedinthemiddleofsomething,itcanbehardtoregainyourtrainofthought,whichcanbeannoying.But
________tenminutesearlier,youwouldn’thavemissedthetrain.Butyouwerelate.
最新回复
(
0
)