首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、They are too busy to detect it. B、It is beyond their supervision. C、The youth are threatened not to tell the truth. D、It doesn
A、They are too busy to detect it. B、It is beyond their supervision. C、The youth are threatened not to tell the truth. D、It doesn
admin
2016-08-29
48
问题
The Internet has created a whole new world of social communications for young people who are using e-mail, websites, instant messaging etc. to stay in touch with friends and make new ones. While most interactions are positive, increasingly kids are using these communication tools to intimidate others. This has become known as cyberbullying.
Today’s young Internet users have created an interactive world away from adult knowledge and supervision. Because bullies tend to harass their victims away from the watchful eyes of adults, the Internet is the perfect tool for reaching others anonymously. This means for many children, home is no longer a refuge from the cruel peer pressures of school.
Nancy Willard of the Responsible Netizen Institute cautions that technology can also affect a young person’s ethical behavior because it doesn’t provide concrete feedback about the consequences of actions on others. This lack of feedback minimizes feelings of regret.
There are several ways that young people bully others online. They send e-mails or instant messages containing insults or threats directly to a person. They may also spread hateful comments about a person through e-mail, postings on websites or online diaries. Some steal passwords and send out threatening e-mails using an assumed identity.
Schools are struggling to address the issue of cyberbullying among students. When real world bullying occurs in a schoolyard, teachers are often able to intervene, but online bullying takes place off the radar screen of adults, making it difficult to detect in schools and impossible to monitor off school property.
9 What problem comes up with more and more teenagers using the Internet?
10 Why can the Internet affect the youth’s ethical behavior?
11 Why is it difficult for parents and teachers to detect the cyberbullying issue?
选项
A、They are too busy to detect it.
B、It is beyond their supervision.
C、The youth are threatened not to tell the truth.
D、It doesn’t show on the radar screen.
答案
B
解析
短文最后提到,若恐吓发生在现实世界,教师通常可以介入。但网络恐吓发生在成年人视线外,想要察觉便有困难了。B正确。
转载请注明原文地址:https://kaotiyun.com/show/kYG7777K
0
大学英语六级
相关试题推荐
ItisnoteasytotalkabouttheroleofthemassmediainthisoverwhelminglysignificantphaseinEuropeanhistory.Historyan
A、Thebooksweretooexpensivetobuy.B、Heboughtalotofbooksoverthere.C、Thereweremanypeopleatthebooksale.D、There
A、Shewantsthemantobuyacalculator.B、Shewantstobuyanothercalculator.C、She’llgiveherstothemanifhebuysherac
DoctorsinBritainarewarningofanobesity(肥胖症)timebomb,whenchildrenwhoarealreadyoverweightgrowup.So,whatshould
It’sTimetoPayAttentiontoSleep,theNewHealthFrontier[A]Yourdoctorcouldsoonbeprescribingcrucialsleepastreatment
A、Byjudgingfromtheirbehavior.B、Bytestingthefunctionofthegenes.C、Byexaminingthenegativeinfluencearoundthem.D、B
A、Theperformanceshavebeenrescheduled.B、Studentdiscountticketsareavailable.C、Pricesforallticketshavebeenreduced.
A、Thegymisalwaysverycrowded.B、Thegymoffersmanydifferentactivities.C、Hedoesntknowhowlatethegymstaysopen.D、T
A、SheiseagertobeacceptedintotheUniversity.B、SheiswaitingtoseeifshecouldgetthejobfromIBM.C、Sheisexpecting
A、Amancarefulwithmoney.B、Abook-lover.C、Anoisyreader.D、Atrouble-maker.A选项描述的是男士的特点,从他两次提及pay,可见花钱很谨慎,故A正确。B、D从原文内容无法推
随机试题
要扩充政府活动,首先应就其________进行仔细认真的研究。
November7,2000isaveryspecialdayintheUnitedStates.Votersallacrossthenationare【21】representativesinlocalandnat
下列符合公司治理基本特征的有()。
用人单位与本单位职工签订集体合同或专项集体合同,以及确定相关事宜,应当采取()的方式。
当企业的业务都实现计算机化后,那些从事计算机业务的企业却遭遇了_______。如果需要计算机化的业务流程没有增加,顾客对性能没有特别需求,他们就无法继续_______自己的产品。所以,所有与计算机相关的企业,都必须为已经得到满足的顾客们,提供一个购买他们更
虎门销烟:《南京条约》
某地区居民生活用水每月标准用水量的基本价格为每吨3元,若每月用水量超过标准用水量,超出部分按基本价格的130%收费。某户六月用水25吨,共交水费83.1元,则该地区每月标准用水量为:
民族精神是一个民族在长期共同生活和社会实践中形成的,为本民族大多数成员所认同的价值取向、思维方式、道德规范、精神气质的总和。在五千多年的发展中,中华民族形成了伟大的民族精神。民族精神的核心是()
二进制数11011101转换为十进制数是()。
在μC/OS—II中有多种方法可以保护任务之间的共享数据和提供任务之间的通信。其中不能达到保护目的的方法是()。
最新回复
(
0
)