首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
admin
2021-01-20
81
问题
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.
Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3 ?
Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a 4 to make the Web a safer place—a "voluntary trusted identity" system that would be the high-tech 5 of a physical key, a fingerprint and a photo ID card, all rolled 6 one. The system might use a smart identity card, or a digital credential 7 to a specific computer, and would authenticate users at a range of online services.
The idea is to 8 a federation of private online identity systems. User could 9 which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license 10 by the government.
Google and Microsoft are among companies that already have these " single sign-on" systems that make it possible for users to 11 just once but use many different services.
12 , the approach would create a " walled garden" in cyberspace, with safe " neighborhoods" and bright "streetlights" to establish a sense of a 13 community.
Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with 14 , trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs. " Still, the administration’s plan has 16 privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet "drive’s license" mentality.
The plan has also been greeted with 18 by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt would still leave much of the Internet 19 . They argue that all Internet users should be 20 to register and identify themselves, in the same way that drivers must be licensed to drive on public roads.
【B6】
选项
A、by
B、into
C、from
D、over
答案
B
解析
这是一道介词搭配题,roll into one,意为合一,是固定搭配。故[B]为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/pA1Z777K
0
考研英语一
相关试题推荐
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Forhundredsofmillionsofyears,turtleshavestruggledoutoftheseatolaytheireggsonsandybeaches,longbeforetherew
ReadthefollowingtextandanswerthequestionsbychoosingthemostsuitablesubheadingfromthelistA-Gforeachofthenumb
ReadthefollowingtextandanswerthequestionsbychoosingthemostsuitablesubheadingfromthelistA-Gforeachofthenumb
Haveyoueverconsideredwhatmakesagoodbossgood?Theanswertothatquestionisadmittedlymercurial,asoneperson’sview
男性从事“女性”职业——1988年英译汉及详解SeatedbehindthefrontdeskataNewYorkfirm,thereceptionistwasefficient.Stylishlydressed,the
随机试题
强调将企业经营目标集中到某一特定细分市场的战略是()
未来的计算机将向巨型化、微型化、( )、智能化和多媒体化的方向发展。
流行性出血热是一种病情凶险的病毒感染,其病原体是
某化工厂的合成车间动力安装工程如图6.Ⅲ所示。(1)APl为定型动力配电箱,电源由室外电缆引入,基础型钢采用10#槽钢(单位重量为10kg/m)。(2)所有埋地管标高均为-0.2m,其至APl动力配电箱出口处的管口高出地坪0.1m,设备基础顶标高为+0
金融体系由()构成。
某歌星在一次演出后,按合同规定应获得劳务报酬18000元。主办单位按照税法,代扣其个人所得税后,应向该歌星实际支付()元。
依次填入下列横线处的词语,最恰当的一组是:①2003年2月1日,美国“哥伦比亚”号航天飞机在从太空返回地面途中解体,机上7名宇航员全部______。消息传出,世界震惊。②地球生态系统是经过自然界的长期______形成的,它是人类生活的惟
设函数y=y(x)在(-∞,+∞)内具有二阶导数,且y’≠0,x=x(y)是y=y(x)的反函数.(1)试将x=x(y)所满足的微分方程变换为y=y(x)满足的微分方程;(2)求变换后的微分方程满足初始条件y(0)=0,的解.
2014年1月,由于DNS根服务器被攻击,国内许多互联网用户无法访问.COM域名网站,这种恶意攻击可能造成的危害是________。
EATS,SHOOTSANDLEAVES—abookreviewThetitleofEats,ShootsandLeavesreferstoafamouslymisp
最新回复
(
0
)